U The InternationalCenterforResearch on the Management of Technology The Patterns of Interorganizational Networks in the Development of Data Communications Technologies Pek H. Soh 1 Edward B. Roberts 2 February 1998 WP # 173-98 Sloan WP # 4010 1 MIT Sloan School of Management and National University of Singapore 2 MIT Sloan School of Management © 1998 Massachusetts Institute of Technology Sloan School of Management Massachusetts Institute of Technology 38 Memorial Drive, E56-390 Cambridge, MA 02139-4307 ABSTRACT Technology alliances have been used increasingly in the last few years in the data communications industry. The dynamics of these alliances highlight the dilemma (or strategy) of firms to achieve interoperability with competing product platforms while attempting to differentiate and promote their own products. Using social network analysis, we explore and identify the network patterns of technology alliances in the development of data communications technologies. To attribute meaning to these network patterns, a taxonomy of innovations based on the framework by Henderson and Clark (1990) is created with the help of two well-qualified field experts. Based on 150 sampled firms and 319 technology alliances in the data communications industry from 1985-1996, we observe that the characteristics of core-periphery structure can best describe the patterns of networks in this industry. More specifically, a small number of firms in the core of the network have jointly developed modular innovations which have implications for emerging standards, whereas many other firms have come together for more limited purposes, supporting incremental innovations at the periphery of the network. Several issues are raised on the correlation between core-periphery structure and the nature of innovation and the conditions under which generalizability can be made. Finally, an important managerial implication is that technology alliances are not merely a choice for sharing costs and risks with partners but are instrumental to the standardization and adoption process in the market. The history of technology alliances among competitors within the industry does determine the trends of emerging technologies. ACKNOWLEDGEMENTS We express our deep appreciation to Professors Michael Cusumano and Scott Stern for their repeated readings of this material and very useful comments on both research methodology and the overall presentation. We also thank Professors Lotte Bailyn, Steve Borgatti, Peter Marsden, Pri Shah, Nancy Staudenmayer, and three anonymous referees from the 1997 Academy of Management Annual Meeting, as well as participants at the M.I.T. Behavioral and Policy Sciences Doctoral Proseminar, for their critiques and helpful suggestions. In addition, special thanks to David Clark of the M.I.T. Lab for Computer Science, Shamik Chakraborty formerly of Digital Technology Inc., and other anonymous company executives for their useful insights in the data communications industry. We appreciate the funding assistance provided by the M.I.T. International Center for Research on the Management of Technology (ICRMOT), the M.I.T. Center for Innovation in Product Development (CIPD - National Science Foundation ERC Award: EEC-9529140), and the National University of Singapore (NUS). All errors and omissions remain our responsibility. Please direct questions or comments to: Pek H. Soh National University of Singapore Faculty of Business Administration 10 Kent Ridge Crescent Singapore 119260 Email: phsoh@alum.mit.edu 1. Introduction Strategic alliances have been used increasingly in many technology-intensive industries since the 1980s (Garrette & Dussauge 1995; Hagedoorn 1995; Hergert & Morris 1988; Mariti & Smiley 1983). Strategic alliances are often depicted as cooperative relationships creating values for partners (Harrigan 1987). According to recent theoretical and empirical literature, firms establish strategic alliances in order to integrate external knowledge (Arora & Gambardella 1995; Hamel 1991; Kogut & Zander 1992), reduce technological and market uncertainty (Mitchell & Singh 1992; Roberts 1985), create synergy between complementary technologies (Olleros & Macdonald 1988; Sinha & Cusumano 1991), and set forth new standards (Axelrod et al. 1995). Hence, from strategic management viewpoint, strategic alliances have important implications for technological innovation. This paper is focused on the patterns and characteristics of alliances in the data communications industry. It aims to develop an understanding of the industry in which strategic alliances have been employed to combine complementary knowledge among potential competitors. According to the knowledgeable critics in this industry, strategic alliances have effectively influenced the properties of emerging technologies. The study therefore raises several implications for the evolution of technology and organization, which may complement the theoretical and empirical insights arising from the existing literature in technological innovation and strategic management. A quantitative method that is useful for understanding the patterns of relationships 1 among firms and that has begun to gain acceptance by some researchers interested in technological innovation is social network analysis (Freeman 1991). Social network analysis allows a researcher to identify and to interpret the patterns of relationships systematically by attributes of actors and/or relationships.' Since strategic alliances generally reflect the cooperation rather than competition among firms, the network methods which identify cohesive subgroups are employed in the study. Cohesive subgroups imply that actors within each subgroup have stronger ties than do actors between any two subgroups. In the study, we examine only strategic alliances like licensing and joint development agreements, which had been intended to create new technologies (referred to here as technology alliances). Business alliances that do not have significant technical contributions to the partners are excluded. Examples of business alliances include supplier and customer agreements, marketing and distribution agreements, product bundling, OEM and value-added reselling activities. Standards-setting alliances that accelerate the implementation of specifications, and mergers and acquisitions that eliminate the possibility of interfirm relationships will be omitted also. In order to interpret the network patterns using alliance data, a taxonomy of data communications technologies in terms of radical, architectural, modular and incremental innovations based on the framework by Henderson and Clark (1990) is defined with the help of two field experts. Both experts are involved in the interpretation of the agreements. Using 150 firms and 319 technology alliances in the data communications In social network analysis an actor can be an individual or an organization. 2 industry from 1985-1996, we demonstrate that social network analysis is useful in exploring the network structures related to emerging technologies. The primary findings suggest that firms differ in their roles within the industry network. One central coalition of firms has repeatedly used technology alliances for the development of modular innovations which have implications on industry standards. In contrast, other firms have come together for more limited purposes, supporting incremental innovations at the periphery of the network. The dichotomy of roles can best be described as the coreperiphery structure. This structure appears to be very stable over a 12-year period. The findings further raise an intriguing question on the relative importance of technologies emerged from the industry network occupied largely by the incumbents, versus those from the new entrants outside the network. The organization of the essay is as follows. Section 2 briefly outlines the objectives of studying interorganizational networks. This is followed by a description of the data communications industry in section 3 and the research method in section 4. Both sections 5 and 6 present the findings of social network analysis. Section 7 presents the discussion and the principal conclusions of the findings. Finally, directions for future research are suggested in section 8. 2. The Objectives of Studying Interorganizational Networks Over the last several years a growing body of literature on interorganizational networks has been published in some top academic journals for business management 3 (see Table 1).2 These studies have explored the patterns of production networks in various industries, including automobile, biotechnology, computer, and fashion (Barley, Freeman, & Hybels 1992; Lincoln, Gerlach, & Admajian 1996; Saxenian 1994; Uzzi 1997). However, a brief review of the literature published from 1990 until June 1997 reveals two difficulties related to the study of interorganizational networks. First, the analyses based on diverse methodologies and definitions of interorganizational networks have made the comparison of network characteristics across industries difficult (Jones, Hesterly & Borgatti 1997). Second, the difficulty in collecting time-series network data has constrained researcher ability to use longitudinal analysis. Hence, researchers across disciplinary training have begun to seek a more quantitative technique to study networks. Table 1. Selected Journals with Articles on Interorganizational Networks 3 Journal Academy of Management Journal Academy of Management Review Administrative Science Quarterly Organization Science R&D Management Research Policy Strategic Management Journal 1990-1997 6 1 5 2 4 19 3 Before 1990 0 4 7 0 0 3 Recently, technology management scholars have called for the use of social Three excellent volumes of network studies are available: a collection of essays on networks and organizations edited by Nohria and Eccles (1992), a special issue in Research Policy (1991, vol. 20, no. 5) dedicated to the topic of "Networks of Innovators", and a recent special research forum on alliances and networks in the Academy of Management Journal (1997, vol. 40, no. 2). Using ABI database in Lexis/Nexis, we searched for article titles with the word "networks" in several refereed journals. Many articles were retrieved but we counted only articles related to networks of firms, as shown in Table 1. The oldest articles went as far back as 1977 in AMR. 3 Many studies on interorganizational networks can also be found in journals like American Sociological Review, Annual Review of Sociology, and Californian Management Review. A more thorough search 2 4 network analysis to identify regularity and characteristics of interorganizational networks in the development of technological systems (DeBresson & Amesse 1991). 4 By using social network concepts and methods, researchers are able to explore and formulate hypothetical behaviors of firms participating in industry networks. The technology management literature in fact shows that social network analysis has long been employed in diffusion studies (Abrahamson & Rosenkopf 1997; Burt 1980; Coleman, Katz & Menzel 1957; Czepiel 1975) and in communications studies related to problem solving (Allen 1977; Freeman 1978; Stork 1991). However, how interorganizational networks evolve and how technological development shapes and is shaped by the evolution of these networks remain among the important questions for technology and strategic management scholars (Freeman 1991; Rosenkopf & Tushman 1994). In the last few years, many scholars have addressed these questions by examining networks from a social network perspective (Barley, Freeman & Hybels 1992; Clarysse, Debackere & Dierdonck 1996; Liebeskind, et al. 1996; Powell, Koput & Laurel 1996; Walker, Kogut & Shan 1997). These studies have so far been done mostly in the biotechnology industry. Given the usefulness of social network analysis in studying interorganizational networks, the purpose of this essay is twofold. The first is to identify the patterns of interorganizational networks driven by technology alliances in the data communications including the abstracts will be considered for future literature review. 4 More than a decade ago, Aldrich and Whetten ( 1981) urged organization theorists to study interorganizational relations from a social network perspective. Although social network theory and methods have been widely applied in social science research, most of the empirical studies were done at the individual level. Some network studies published in the 1970s and 1980s were based on local communities (Gray, 1990). Two early review articles on the use of social network methods for organization studies are Tichy, Tushman and Fombrun (1979) and Fombrun (1982). 5 industry. The second is to identify and interpret the characteristics of innovations specific to particular firms or grouping of firms in the industry. An attempt is made to integrate the findings within the well-cited innovation framework by Henderson and Clark (1990). The understanding of the data communications industry network that is driven more by technology rather than science would provide an interesting contrast to existing studies in the biotechnology industry. Since longitudinal data on technology alliances in this industry are accessible from public databases, the study can trace the evolutionary patterns of networks which would otherwise be difficult using cross-section data alone. 3. The Data Communications Industry 3.1 Technologies and Markets The data communications industry began to amplify the power of the computer in the late 1970s with a revolutionary technology--local area network (LAN), which connects multiple devices such as computers, printers and file servers by a physical medium in order to provide distributed processing capability for the end-user.5 In 1977 Datapoint Corporation implemented the first commercial LAN technology (ARCnet). Several competing technologies followed immediately and were aggressively promoted by some dominant firms in the industry. The LAN standard-setting committee IEEE 802 5 Although data communications between mainframes and terminals began in the 1950s, the birth of the data communications industry is defined herer by the year 1977 in which the first LAN technology was commercially available in the market. Appendix A provides a synopsis of local area network standards and technologies. 6 finally approved Xerox's Ethernet and IBM's Token-ring networks as industry standards in 1981.6 Many early entrants in the industry during the late 1970s were established firms from other related industries. In 1982 GE targeted the factory automation market with a LAN product called GEnet that complied with the IEEE 802 LAN standard. By 1985 AT&T was positioned to compete with IBM on the LAN front with the introduction of its UNIX-based Starlan. By 1991, however, many independent networking vendors finally started delivering interoperable technologies across multiple networking platforms. 7 For example, DEC who had been a key player in Ethernet announced its first token ring products and Apple Computer unveiled its first gateway for system network architecture (SNA), the proprietary network architecture of IBM. Since 1992 intranet and internet activities--connectivity between LAN segments distributed geographically, have become the main thrust of growth and competition in the data communications industry. From 1993 to 1996, we see the emergence of mature standards in networking hardware with various transmission speeds and greater bandwidth, enabling applications to be built independent of hardware platforms and network architectures. 8 There are switched Ethernet, Fast Ethernet (either 10OBase-X or 100VG-AnyLAN), switched Fast Ethernet, Gigabit and switched Gigabit Ethernet. Token-ring comes in 4- and 16-Mbps (megabit per second) options, as well as a switched 6 Ethernet technology was invented by Robert Metcalfe at Xerox in the 1970s. The technology was later jointly promoted by Xerox, DEC and Intel from 1976 until about 1981. 7 PC Week, February 10, 1992 8 MIS Week, January 1, 1990 7 version. There are also FDDI and switched FDDI, and ATM in 25, 100, 155 and 622 Mbps. 9 Modems, ASDL and ISDN are other technologies for remote access, allowing users to connect to their corporate computer systems from homes or office branches.' 0 These new technologies are expected to drive the worldwide LAN market from $20.5 billion in 1996 to $37 billion in 2000 (see Figure la and Figure lb)." In U.S. 80% of the companies with more than 100 employees have a LAN and 85% of the employees in those companies have PCs connected to the LAN. 12 However, 90% of LAN users remain on Ethernet or Token-ring networks and have not migrated to high-speed technologies such as 100Base-T and ATM. 13 9 FDDI (Fiber Distributed Data Interface) is a high-speed token-ring networking technology designed to run over optical fiber at the rate of 100 megabit per second. ATM (Asynchronous Transfer Mode), another high-speed technology that is designed to be a fast, general purpose transfer mode for multimedia transmissions. 10 ADSL (Asymmetric Digital Subscriber Line) transmits megabits over twisted-pair telephone lines that already exist. ISDN (Integrated Services Digital Network) is an older technology that provides greater speed and bandwidth over regular telephone lines. 1 Doyle Lee, "Global LAN Market: Key Trends and Influences, 1996 to 2000," International Data Corporation (IDC) Report, No. 12715, December 1996. 12 Ibid. 13Corporate users can deal with the high demand for internet bandwidth by segmenting their networks via LAN switching technology and installing high-speed LAN backbones. 8 Figure la. Worldwide LAN Market Revenues by Segment, 1996 Remote access .---. 12% A] 2 LAN Switches 7% NICs 19% Hubs 26% Routers 24% 1996 Market Size = $20.5 billion Source: IDC Report, see footnote 10. Figure lb. Worldwide LAN Market Revenues by Segment, 2000 Other* 2% Reemote 27 A Ct ho, Jwlvllra 22% NICs 9% AT 6% \ Hubs Hubs 17% Routers 17% 2000 Market Size = $37 billion *Other includes Gigabit Ethernet and other new technologies. Source: IDC Report, see footnote 10. 3.2 Data Communications Firms We compiled the list of firms in the U.S. data communications industry using the CorpTech directory which has been published yearly since 1986.14 The CorpTech directory consists of the profiles of all public and private firms involved in technology- 9 intensive industries by product types. Figure 2 below shows the distribution of firms founded in the industry between 1980 and 1996. The number of new entrants during this period is 362. The number of firms founded before 1980 in other related industries like computer and telecommunications approximately accounted for another 134 entrants. Figure 2. Number of Entries and Exits by Year in the Data Communications Industry 300 250 O 200 E 150 Z 100 50 0 - Entries - Acquisitions/Exits I -A-Total in industry o 00 N 00 t 00 \D 00 00 00 O 0\ " CO\ It 0 O\ Year Source: CorpTech Directory (1986-1997) and Lexis/Nexis (1997) While collecting information from public sources, we also found that the number of mergers and acquisitions was increasing in the 1990s. The number of acquisitions per year is included in Figure 2. The total number of firms in the industry by 1996 is 496 and the total number of acquisitions is 168, almost 34% of the firms being absorbed within the industry. 5 Besides acquisitions, dissolution and bankruptcies were checked using the 14 The CorpTech Directory, Corporate Technology Information Services, Inc. Woburn, MA. Internet:http//www.corptech.com. 15 Based on recent industry reports in Dow Jones Wires, the number of acquisitions is rising in this industry. The actual number of acquisitions could be higher since many small acquisitions are not widely reported in news announcements. 10 Directory of Obsolete Securities and the bankruptcy database in Lexis/Nexis.16 Only two bankruptcies were detected. search. Two reasons may account for the low outcome of this First, information on private firms is not well covered in the bankruptcy databases and there are about 250 private firms in the industry. Second, many firms that entered the industry but left within the first three years were not published in the CorpTech directory in the first place. Therefore, the number of exits in Figure 2 basically reflects the number of acquisitions in the industry. 4. Research Method 4.1 Social Network Analysis Social network analysis is focused on uncovering the relational patterns of interaction among individuals or organizations. Most social network analyses can be simplified into three steps. The first is to generate some structural patterns from the relational data. Then the characteristics of these patterns are identified and interpreted using additional information such as attributes of actors and their relationships. t7 Finally, implications are drawn as to how the specific patterns and their meaning advance our insights into the relevant field of research. The following sections explain in details the methods applied in the first and second steps. The findings and their implications are discussed in Sections 5 and 6. Directory of Obsolete Securities, 1991 Edition, Financial Information, Inc. Jersey City, NJ. 17 Actors are referred to as individuals or organizations. 16 11 Step 1: Representation of Network Structures Two general techniques can be applied to represent network structures, i.e. relational and positional methods (Dimaggio 1986; Mizruchi & Galaskiewicz 1993; Wasserman & Faust 1994). Relational methods identify cohesive subgroups within a network based on specific properties of ties between actors. Depending upon the hypothetical social processes, the properties of ties impose certain restrictions on the network structures. For example, we can formulate the patterns of information diffusion through intermediaries by specifying the number of intermediate ties between any two actors. In contrast, positional methods partition actors based on the similarity of their ties to all other actors and stress competition among actors within a structural position. Two actors are said to be "structurally equivalent" if they have identical ties to and from all other actors in the same network. These two actors may or may not have direct ties with each other but they are competing for resources provided by their identical partners. Since technology alliances in the data communications industry reflect the development of highly inter-dependent technologies, relational methods are conceptually more sensitive to identifying clusters of cooperative relationships. Furthermore, the resulting cohesive subgroups can be interpreted in the second step by the substantive contents of their partnership agreements. Various graph theoretic techniques are available to identify cohesive subgroups but many of them require the properties of ties to be specified beforehand (Wasserman & Faust 1994). Since the organizing concepts and underlying dimension of the industry network is not known a priori, we employ a less 12 restricted approach, i.e. multi-dimensional scaling (MDS), to display the proximity of firms in the network graphically. The use of MDS to represent the relative distance and closeness of actors within a network is typical of social network analysis (Coxon 1982; Schiffman, Reynolds & Young 1982). Based on some measure of pairwise proximity among actors, such as the geodesic distance between each pair of actors, MDS will compute a set of estimated coordinates among pairs of actors.' 8 In a two-dimensional spatial map, MDS represents "similar firms" as coordinates close to each other whereas "dissimilar firms" as coordinates distant from each another. Tables B-1, B-2 and B-3 provide examples of the output in generating the MDS map by UCINET, a software program for social network analysis. 19 Step 2: Interpretation of Network Structures The interpretation of an MDS map is twofold. First, we look for significant patterns in the MDS configurations, i.e. detect structures that are not simply arbitrary artifacts of the scaling procedure but are stable characteristics of the original data. Then we ascribe a meaning to these structures using additional information such as properties of firms and their relationships with others. 18 In graph theory, a geodesic is a shortest path between two nodes. There could be more than one shortest path between two nodes. The geodesic distance is defined as the length of a geodesic between the two nodes. 19 Borgatti, Everett and Freeman, 1992, UCINET IV, Columbia: Analytic Technologies. Also special thanks to Professor Borgatti for his help and suggestions in the use of the software and social network analysis. 13 The graphical output of MDS is depicted in this study as a set of firms connected by lines, indicating the presence of alliances between two firms. 20 In addition, thicker lines will be used for any two firms that have relatively more alliances with each other in the network. Three aspects of MDS configurations that have received much attention are: 1) the dimensions (orthogonal axes which span the MDS space), 2) the simple graphical structures (chains, circular and etc.), and 3) the regions (high density of points relatively to low density of points) (Coxon 1982). In the study, regions with varying degrees of density are expected to emerge since firms with more alliances among themselves are likely to cluster in space. For this reason, a network measure called centrality, which highlights the structural differences between firms by their relative locations in the network, would be useful in simplifying the network patterns. Three different measures of centrality are commonly used in social network analysis, namely, degree, betweenness and closeness. Among the three measures, closeness centrality is more appropriate because it considers how central the firm is with respect to all others in the same network. On the other hand, degree centrality counts the number of direct ties from the focal firm only and betweenness centrality assumes that the importance of a firm is reflected in the firm's potential control over the paths connecting two other firms. Appendix C provides additional information on closeness centrality. Finally, the contents of technology alliance agreements provide a substantive The graphics are generated by the software called Krackplot 3.0, 1995, Krackhardt, D. Blythe, J., & McGrath C., Natick, MA: Analytic Technologies. http://analytictech.com/ 20 14 interpretation of the network patterns. A conceptual framework defining the nature of innovations is thus necessary for systematic analysis of the contents. The notion that different types of innovations exist has important implications in the studies of technological innovation. In particular, following Schumpeter's (1942) notion of radical and incremental innovations, studies have found evidence of radical innovations destroying existing capabilities and markets whereas incremental innovations enhance existing skills and knowledge (Abernathy & Clark 1985; Christensen 1995; Henderson & Clark 1990; Tushman & Anderson 1986). The following section describes how a taxonomy of innovations in the data communications industry was designed for this study. 4.2 Taxonomy of Innovations In this study technology alliances involve technological developments in the network environment of the International Standards Organization (ISO) reference model as shown in Figures A-2 and A-3 of Appendix A. These developments commonly reflect a need for hierarchical connectivity among the network components. Each ISO layer defines a particular protocol necessary for data transmission with specific capability. Interconnectivity across layers further ensures that data are translated into appropriate codes handled by adjacent layers. Therefore, technological innovations happen within and across layers in the network environment. A taxonomy of innovations that defines the extent of design changes made in the network environment would be useful for 15 classifying the technology agreements. Owing to the complexity of networking technologies, an engineer who has been developing products for the network environment for the past three years was recruited to help define the taxonomy. First, he was briefed on the purpose of his tasks and given the literature by Henderson and Clark (1990), Christensen (1992a, b), and Tushman and Anderson (1986) to review the various theoretical frameworks. We then examined the publications available in the International Data Corporation's (IDC) library to explore other possible models employed by industry analysts. Not surprisingly, the IDC industry reports tend to focus on general product features from the end-user's viewpoint. We felt that a conceptual model which addresses the technical implications of interfaces and components separately would be more useful for our purposes. Given that technical changes involve both ISO layers and their linkages, the framework of component and architectural innovations developed by Henderson and Clark (1990) appears to be applicable, as shown in Figure 3. Four types of innovations are defined: incremental, modular, architectural and radical. The collaborating engineer felt that radical innovations which change the core concepts and redefine the linkages rarely occur in this industry. The first radical innovation in the data communications industry was probably the concept of local area networking itself. In his opinion no technological development in the past 12 years from 1985-1996 can be qualified as a radical innovation. 16 Figure 3. A Taxonomy of Innovation Adapted from Henderson and Clark (1990) Core Concepts of ISO Layers Reinforced Overturned Reinforced Incremental Innovation Modular Innovation Changed Architectural Innovation Radical Innovation Linkages between ISO Layers Architectural innovation is rearrangement of the way in which component layers relate to each other. The basic purpose of each layer remains unaffected. However, new functionality may be added into the layer in order to support the rearrangement. example, Ipsilon Networks' architectural innovation.21 IP (Internet Protocol) switching technology For is an Ipsilon Networks claims that the technology resolves the problems of complexity, inefficiency and functionality duplication inherent to the traditional networking approaches. In essence, IP switching goes against the conventional layered architecture of neighbor-layer opacity and ties up the IP Layer with the ATM (Asynchronous Transfer Mode) Adaptation Layer by defining two new protocols called GSMP (General Switch Management Protocol) and IFMP (Ipsilon Flow Management Protocol). The basic approach is to route IP traffic (Layer 3) on top of ATM Adaptation Layer (Layer 2). The traditional approaches to this end have been LANE (LAN Emulation) defined by ATM Forum, Classical IP over ATM from the IPATM working group of IETF and MPOA (Multiprotocol over ATM) under ballot from ATM Forum. 21 17 Modular innovation involves a replacement of protocol or technology for a given ISO layer. This can be viewed as a fundamental change in the technology used in that layer, leaving the other layers unchanged. The entry of ATM (Asynchronous Transfer Mode) technology in early 1990s in the networking industry is an excellent example of modular innovation. 22 Finally, incremental innovation adds new functionality to existing technologies for one ISO layer and enhances the interface with adjacent layers which use different technologies. Gigabit Ethernet is a good example of incremental innovation. Gigabit Ethernet technology fully capitalizes on the existing installed base of Ethernet technology (IEEE 802.3 CSMA/CD Layer 2 Protocol). The basic limitation of traditional Ethernet technology was limited bandwidth (10 Mbps). Gigabit Ethernet technology uses the same Layer 2 Ethernet technology over Fibre Channel Physical Layer (Layer 1) to achieve bandwidths of the order of 1 Gbps. The coding of technology alliances based on the above taxonomy of innovation remains a difficult task since a good understanding of the history of technological developments and the technical details is necessary. Although a panel of industry experts would be ideal, owing to the time constraint to complete the study, another expert (Expert 2, E2) was sought to perform the coding in parallel with the first engineer (Expert 1, El). The main advantage of having independent experts to apply the taxonomy is to resolve ATM is basically a Layer 2 technology. ATM delivers important advantages over existing LAN and WAN technologies, including the promise of scaleable bandwidths at unprecedented price and performance points and Quality of Service (QoS) guarantees, which facilitate new classes of applications such as multimedia. 22 18 any problematic issues arising from coding. Comparison of coding outcomes is made to ensure reliability of scores. Through an interview with a founder and chairman of a prominent networking company in Massachusetts, E2 was identified and recruited to assist. This second expert is most qualified, a Senior Research Scientist who has been developing advanced communications techniques in the M.I.T. Laboratory for Computer Science and is well-known in the industry. He has been actively involved in the development of local area networking technologies since the 1970s and continues to attend many standards meetings and professional conferences in the industry. In addition, he serves as a board member of a networking company. E2 was briefed on the purpose of his tasks and given the taxonomy of innovations to examine. He did not find particular problems with the various definitions in the taxonomy. He was later told that El had assisted in coming up with the definitions and would be coding the alliance agreements independently. Both experts were given Tables D- 1, D-2 and D-3 in Appendix D and a total of 61 alliance agreements to code. 4.3 Longitudinal Network Data Technology alliances are used in this study to represent the formal relationships between firms. For each of the 496 firms found previously, full-text descriptions of technology alliance agreements, if any, were retrieved from Lexis/Nexis and Dow Jones Wires. Most agreements included joint product development, licensing and/or cross- licensing agreements. Figure 4 below shows the distribution of alliance agreements 19 established in the U.S. from 1980 to 1996. There are 613 joint product development agreements and 157 licensing agreements. In fact, the total number of agreements should be higher since we omitted agreements that were not publicized, international agreements involving firms outside of U.S., and minority equity investments. 2 3 Figure 4. Number of Joint Product Dewlopment and Licensing Agreements by Year in the Data Communications Industry 150 1oo 0 1;. % I \ I t~v. -n- LI 0 o 00 O G 00 \ O\' t 00 0' 10 00 0\ O\ 00 00 0 O O\ N 08 O O 0 \ a\ 0' Year Source: Full-text reports from Lexis/Nexis and Dow Jones Wires, 1997 Figure 4 also shows a downtrend in the alliance activity from about 1995. Three factors may have contributed to this decline: 1) the decrease in the number of new entrants, 2) the increase in the number of acquisitions, and 3) data not yet available online in the public databases. Technology alliances were sparse before 1985 because early technological developments were largely focused on proprietary technologies. For this reason, only Minority equity investments have been used as an incentive to motivate the invested firms to undertake product development projects that meet the objectives of the investing firms. However, minority equity investment data were not widely reported in public sources for the intended analyses later. 23 20 alliance agreements from 1985 to 1996 were examined. All input data to UCINET are in the form of NxN matrices, where N is the number of firms involved in technology alliances and each cell indicates the number of agreements between two firms. More than 150 firms were detected over the 12-year period. Given the large matrix, the graphical representations of MDS would be extremely difficult for the analyses. Consequently, we split the dataset into three time periods that approximately coincide with the emergence of particular industry standards: 1985-1988, 1989-1992, and 1993-1996. According to various industry sources, 1985 marked the year of market growth with two competing standards, Ethernet and Token Ring, dominating the development of new component technologies. In 1989 one of the first industry standardssetting forums was initiated by competing firms to advance the FDDI STM standard (an improved protocol over token ring networks.) Since then, many large standards-setting forums have been promoted by major industry players rather than the standards-setting bodies like IEEE, ANSI and ITU (see Appendix F for standards-setting forums.) 24 Finally, 1993-1996 represents the dramatic growth of data communications markets driven by internet and intranet activities. About half of the total technology alliances were established during this period. Although the division into these time periods seems somewhat arbitrary, subsequent analyses based on the variation in the global network patterns will confirm the significance of industry forces such as market growth and standardization in driving technological changes over time. IEEE is the Institute of Electrical and Electronics Engineers, Inc., ANSI is American National Standards Institute, and ITU is International Telecommunications Union. 24 21 For the three periods, there are 32, 127 and 211 firms, and 36, 118 and 207 agreements respectively. However, some of these alliances were non-repeated, dyadic relations between two firms that are isolated from all other firms. Since isolated firms cannot be reached by others, closeness centrality measure will assign zeros to all firms in the network. For this reason, isolated relationships were omitted in the analyses. In the final sample, we ended up with 28, 68 and 117 firms and 34, 89 and 196 agreements in the corresponding periods. Table 2 below gives the distribution of the most recently founded firms by period. Overall, few firms in the sample are less than 8 years old. Table 2. Number of Most Recently Founded Firms in the Sample by Period Period 1985-1988 1989-1992 1993-1996 Percentages 5. Total no. of firms in No. of sample firms in No. of sample firms the industry founded this period founded in this period in this period 113 28 5 (18%) 82 68 5 (7%) 43 117 4 (3%) in parentheses are the proportions of sample firms by period. No. of sample firms founded in the 4 years prior to this period 7 (25%) 17 (25%) 10 (8%) The Characteristics of Network Structures and Memberships The patterns of the industry networks in three periods are presented in Figures 5, 6 and 7. Each line joining any two firms represents the presence of alliances but a thicker line indicates 2 or more alliance agreements were established in separate years. Since the 25 The total number of alliance agreements from 1985 to 1996 included in the matrices is 361, which is slightly more than half of the reported number 684 in Figure 3. Two reasons account for the discrepancy. First, those omitted agreements involved largely private firms and some non U.S. parent firms for which we could not obtain sufficient information. We decided to drop these firms in the study. Second, Figure 3 has incorporated the latest results from the second and third searches through Dow Jones Wires, which produced many new agreements not found previously in Lexis/Nexis. Nevertheless, the set of 361 alliances 22 list of alliance agreements for each period was compiled from public sources, some agreements might have been omitted in the analysis. Despite the omissions, the global representation of the industry networks can be revealing in regard to emerging network characteristics over time. In Figure 5, the network pattern from 1985-1988 shows three branches intersecting at 3Com (3CO) and Microsoft (MS) in the center of network. Both firms were known to be developing networking software and hardware, such as OS/2 LAN Manager, compatible to the IBM PC platform during this period. Several other notable firms like DEC, AT&T, Intel (INT), and Novell (NVL) occupy positions at the three branches respectively. DEC was developing various technologies including modules connected to baseband Ethernet, broadband Ethernet, and WANs. Novell was implementing connectivity for PC workstations to LAN servers through TCP/IP gateway, whereas Intel was developing Ethernet and ISDN chips for Ethernet and remote access technologies. has at least incorporated the prominent agreements in the industry during the last 12 years. 23 Figure 5. Network of Firms in the Data Communications Industry, 1985-1988 SMC MT INT \/ ATT RT SC) v t NET /ET I M \G | j O0---- B C DG RAB C] DCA ORV STR DSC SNP WSD 24 Figure 6. Network of Firms in the Data Communications Industry, 1989-1992 SIL WDT LSI FOR FUJ CY 1 ULT / LUX / TRW XCO--GDC -- GDL COD TT ASC IDE INT VLK I XPL NLK From Figure 5 to Figure 6, however, four significant characteristics of interorganizational dynamics emerged over time. First, the industry network evidently has become denser and more connected among firms. Second, some firms like DEC, HP, Novell (NVL), and SynOptics Communications (SNP) from the branches in the last period have moved closer to the center of the network by forming relationships with other 25 existing firms, especially 3Com that has continued to maintain the central position. In contrast, others like AT&T, Intel (INT) and UB Networks (UBN) have remained in their branch positions. Third, repeated alliances are apparent among some firms from the last period. Finally, new branches have emerged, led by Cabletron Systems (CBT), Cisco (CSO) and Wellfleet Communications (WFL) that did not exist in network before. Figure 7. Network of Firms in the Data Communications Industry, 1993-1996 g l. 26 Interestingly, Figure 7 reveals some similar network characteristics in the third period. First, even more firms participate in the industry network. Second, 3Com, HP, IBM and SynOptics (SNP) have maintained their central positions by forming more alliances. The exceptions are DEC and Novell (NVL) which appear to have fewer alliances compared to the last period. Third, companies like AT&T, Cisco (CSO), Ericssons (ERC), Intel (INT), NorTel (NT, formerly known as Northern Telecom), and UB Networks (UBN) have moved to the center of the network from their boundary positions, whereas Wellfleet (WFL) and Cabletron have not. Finally, many new branches that are relatively well connected with others along the boundary have emerged. These positions are led by General Datacomm (GDC), Optical Data Systems (ODS), and Sun Microsystems (SUN), and so on. Further investigation suggests that no obvious firm characteristics like founding age and firm size can be associated with the dynamics of interorganizational relationships. However, some network characteristics like centrality can be useful in summarizing the patterns of network structures. Table 3 shows the characteristics of networks in three periods by closeness centrality and network centralization measures. In each successive period, the size of the network (number of firms) is twice as large and the number of alliances is more than double. The statistical means of the firm-level closeness centrality are almost the same and the standard deviations are low across the three periods. The network centralization index is a group-level measure of variation in The normalized closeness centrality indices are expressed in percentages by UCINET. Firm-level indices are not shown here except for the statistical mean. 26 27 firm-level centrality. The larger the index the more likely that a particular firm is quite central, with remaining firms considerably less central. The network centralization indices here are relatively small and stable (26.83-29.97%). Table 3. Characteristics of Networks by Closeness Centrality and Network Centralization Closeness Centrality Mean at firm-level Std Dev Minimum Maximum Network Centralization Number of Firms Number of Alliances 1985-1988 26.12% 5.74% 17.76% 40.30% 29.97% 28 34 1989-1992 23.69% 5.04% 14.50% 36.81% 26.83% 68 89 1993-1996 25.87% 4.88% 14.85% 39.32% 27.26% 117 196 The high stability of aggregate network properties does not, however, imply a low turnover of network memberships across time (Morgan, Neal & Carder 1996). The distribution of firms participating in the networks is given in Table 4. Only 14 firms (9%) continued to form alliances in all three periods. 33 (22%) additional firms formed alliances in two consecutive periods and 101 (67%) firms participated in a single period only. However, these numbers may be different since 72 firms are right censored in the third period, i.e. no data available as to possible firm activity later than 1996. Overall, we observe a low stability of network memberships. 28 Table 4. Characteristics of Network Memberships Period(s) Number of firms* The first period only (1985-1988) 8 The second period only (1989-1992) 21 The third period only (1993-1996) 72 The first and second only 4 The first and third only 2 The second and third only 29 All three periods 14 Total 150 * The number of firms participating in specific period(s) only. Given that the exploitation of external sources of innovation is not limited to alliances, the stability of network memberships can also be affected by the mergers and acquisitions activities in the entire industry. In terms of the relative use of alliance and acquisition strategies from 1985-1996, 8% (42 out of 496) of the firms used both alliance and acquisitions, about 22% (108 out of 496) used alliances alone and 17% (85 out of 496) used acquisitions alone.27 Slightly less than 50% of all firms in the industry use either or both alliances and acquisitions. Table 5 indicates that only 18 (11 %) firms participating in the networks had been acquired. Of the total 160 acquisitions, 90 (56%) were made by non-members of the networks whereas 70 (44%) were made by 42 members of the networks. From 1989 to 1996, however, the acquisition trend of members (columns 3 and 5 in Table 5) is rising faster than that of non-members (columns 4 and 6 in Table 5), presumably reflecting the larger size of network members. Note that all the percentages reported in this paragraph could be higher since the total number of 496 firms has not accounted for the number of acquisitions each year. 27 29 Table 5. Number of Acquisitions Made by Members and Non-members of Networks Period 1985-1988 1989-1992 1993-1996 Total Total no. of firms acquired in the period No. of non-members acquired by members No. of non-members acquired by nonmembers No. of members acquired by members No. of members acquired by nonmembers 22 43 95 160 4 10 42 57 15 31 39 85 1 2 11 13 2 0 3 5 The above results suggest that instead of being an acquisition target themselves, members of the networks have become more likely to acquire non-members. phenomenon raises two interesting empirical questions. This Are non-members of the networks more likely to have better technologies which lead to their acquisitions by others? Are network members more likely to maintain their status quo owing to their prior relationships with others? To examine these questions systematically, more empirical data on non-members as well as the relative motives of acquisitions and alliances are required. More implications of the questions will be discussed in the conclusions of this essay. To further understand the dynamics of networks, Table 6 below lists the identities of only "high-centrality firms" that have closeness centrality one standard deviation above the statistical means. All 19 firms in the table are early entrants in the industry, even really including Bay Networks, established in 1994 as a result of a merger between SynOptics (1985) and Wellfleet Communications (1986).28 In Table 6, the founding year of the firm is stated if it was a new entrant in the data communications industry. In the case of established firms from related industries like computers and telecommunications, we stated the year in which their networking divisions were formed (like AT&T, HP, Ericsson and 28 30 I Table 6. Subset of High-centrality Firms - 1985-1988 (4 firms) 1979 3CO* (3COM) 1983 HP* 1984 MS " ' (Microsoft) 1979 TND* (UB Networks) I,~ 1989-1992 (11 firms) 1979 3CO* (3COM) 1976 DEC2 1982 EXC"' (Excelan) 1983 HP* 1979 IBM* 1984 MS 1'2 (Microsoft) 1983 NET 23' (Network Equipment Technologies) l'~ 1973 NT 2 3 (NorTel) 1983 NVL* (Novell) 1985 RTX' 2 (Retix) 1985 SNP2 3 (SynOptics) _ 1993-1996 (15 firms) __________ 1979 3CO* (3COM) 1983 ATT* 1994 BAY (Bay Networks) 1983 CHP2 3 (Chipcom) 1984 CS 2 '3 (Cisco) 1985 ERC 2 3 (Ericsson) 1983 HP* 1979 IBM* 1976 INT3 (Intel) 1977 MOT3 (Motorola) 1973 NT2 3 (NorTel) 1983 NET2 '3 (Network Equipment Technologies) 1985 SNP2 3 (SynOptics) 1986 STR3 (Stratacom) 1979 TND* (UB Networks) 14% (4 out of 28 firms) 16% (11 out of 68 firms) 13% (15 out of 117 firms) Note: High-centrality firms here have indices one standard deviation above the corresponding means in Table 3. Year of founding the networking business is given beside each firm. The superscript number indicates the period in which the firm has centrality above the mean. An asterisk shows that the firm has centrality above the mean in all three periods. The bottom row indicates the percentage of high-centrality firms in each network. 15 firms (including Bay Networks in its former identity as SynOptics) were active in at least two periods. 13 firms have made a total of 35 acquisitions, that is 50% of the acquisitions made by all network members over three time periods (see also Table 5). Among these 13 firms, only 3Com, Cisco and Novell have acquired other high-centrality firms, namely, Chipcom, Stratacom and Excelan respectively. The two latter acquired firms had been partners of the acquiring firms prior to acquisitions.2 9 Independent sales Motorola) or some of their first projects related to LAN were announced (like DEC, IBM, Intel and Microsoft). 29 Among all acquisitions in the industry, a total of nine firms have acquired their former alliance partners. These firms are Bay Networks, Cisco, General Instrument, Network General Corp., Network System Corp., Networth, Novell, Telco Systems and Synernetics. Bay Networks, Cisco and Novell are the only highcentrality firms. 31 data from 1993 to 1996 were not available for Chipcom, Stratacom, SynOptics, UB Networks and Ericsson. Of the 10 other firms, only NET is not among the top 50 producers in 1994 and 1995 sales revenues ranked by NetworkWorld. 30 High-centrality firms can be broadly characterized as early entrants and market share leaders in the industry. They are also more likely to make acquisitions compared to low-centrality firms. 3 The above observations lead to an interesting question: do firms with more resources also attract more partners? If they do have more resources than others, what then are the benefits of forming more alliances? The technology management literature has informed us that larger, established firms tend to be less innovative than new entrants. Consequently, alliances and acquisitions may be the best alternatives for these larger firms to gather new ideas so as to complement their internal capabilities. However, if alliances bring external sources of innovation, why then are not more firms like those with low-centrality forming more alliances? Recall that low-centrality firms are also less likely to make acquisitions. Low-centrality firms either do not have the resources to attract potential partners or they are more innovative in the first place. It is apparent that the factors underlying the choice for alliances, acquisitions and internal development differ between high-centrality and low-centrality firms. All the above questions thus have compelling implications for the evolution of technology. More NetworkWorld, December 30, 1996. The top 50 firms include many established firms from the telecommunications and computer industries. These firms are involved in other areas of data communications technologies such as software and wireless technologies that are not included in the study. 31 Low-centrality firms have centrality below the means, whereas others with centrality equals to or above 30 32 empirical data related to technology alliances will be analyzed in the next section in order to understand the potential roles played by high-centrality versus low-centrality firms in the industry network. Despite their differences, high-centrality firms and low-centrality firms are two potential sources of stability in the global network structure. The first source is a set of "core" ties that are relatively stable and have anchored the composition of the network over time. The second source is a set of "peripheral" ties that are relatively interchangeable, rendering the aggregate network properties unchanged. These two sources are not mutually exclusive, so either or both could be a source of network stability. Three explanations are possible for the above speculation. First, a small number of firms might proactively be using alliances as a strategy for a variety of reasons, acquiring complementary technologies and expertise, speeding up new product development and monitoring emerging technologies. In contrast, most firms are probably using alliances as the best option at the time relative to in-house development. While the benefits of strategic alliances are manifold (Contractor & Lorange 1988; Hagedoorn 1993; Tucci & Cusumano 1994), many firms are still skeptical about forming partnerships with present or potential competitors. Asymmetric attributes of the firms can change the relative bargaining power as well as the relative competitive standing between partners (Hamel 1991; Yan & Gray 1994). Even when such skeptical firms participate in joint projects, these alliances are less likely to be involved in highly the means will be high-centrality firms. 33 sensitive areas of technological innovation. Second, from the social capital viewpoint (Burt 1992b; Coleman 1990), firms that are more "central" in the network by virtue of maintaining many direct and indirect relationships with all other firms have better access to information leading to potential alliance partners. On the other hand, firms located on the periphery of the network obtain lower information benefits, hence have lower inclination for new relations. Walker, Kogut and Shan (1997) showed that the development and maintenance of social capital have led incumbent firms to reproduce the existing network structure, giving rise to network stability. Similarly, Gulati (1995) found that the social structure of past alliances explains the formation of new interorganizational relationships. The stability of highcentrality firms versus the instability of low-centrality firms in this study is good evidence of the varying opportunities and constraints in information access available to the two types of firms. Third, with increasing networking experiences, the marginal costs for central firms to form new alliance relations can be assumed to be decreasing. However, the marginal costs are likely to be relatively higher for the boundary firms. From the transaction costs viewpoint, firms are assumed to be opportunistic and the market for technological knowledge is imperfect, thus leading to high contractual costs in technology exchange transactions (Teece 1992; Williamson 1985). On the other hand, reciprocity and trust are important social factors in any bilateral transactions (Bradach & Eccles 1989; Ouchi 1980; Ring & Van de Ven 1992). Richardson (1972) pointed out that 34 firms achieve stability and reliability in their relationships with other firms through qualitative coordination. Closeness of ties, reciprocity and trust can all play a part as a cost-effective monitoring device for firms' deviant behaviors. The ability of central firms to manage a diversity of new and repeated relationships with particular partners in the past certainly reflects the potential trust level in new transactions, hence sustaining the stability of their participation in the network. The relatively few new entrants that participated in the network, as shown in Table 2, may in fact indicate that young organizations require time to build up their reputations and perhaps also their internal capacities necessary to be in the network. Above all, resource dependency, information benefits and networking experience are potential explanations that support the stability of "core-periphery" structure of the industry network. In the following section, we explore the correlation between core- periphery structure and nature of emerging technologies by using the coding scores from two industry experts. 6. The Link Between Core-Periphery Structure and Nature of Emerging Technologies Tables D- 1, D-2 and D-3 in Appendix D list by period the contents of technology alliances for the subgroups in Table 7. These subgroups were selected randomly from Figures 5, 6 and 7 respectively. Ideally, all alliance agreements should be evaluated. 35 Unfortunately, the time available from each expert was limited to at most three hours.3 2 Hence, the interpretation of alliances associated with the core-periphery structure must be treated with caution. Table 7. Selected Cohesive Subgroups by Period ' 1989-1992 Cabletron, Cayman Systems Bytex, Crosscom 1993-1996 1. 2. 1985-1988 Chipcom, DEC Codenoll Technology, 1. 2. 3. Sytek IBM, Network 3. Excelan, Network System Corp., Wellfleet Communications Equipment Technologies 4. 5. Tiara, Sun Netrix, Pacific Communication Microsoft, 3COM, UB Networks Excelan, Novell, Oracle 6. 7. Sciences Ericsson, Luxcom 3COM HP 6. SynOptics, Western Digital 8. 9. Chipcom, IBM National Semiconductor, Network 7. AT&T, Intel Equipment Technolozies 10. Fujitsu Network Systems, Tellabs 11. Codenoll Technology, Lanex 12. Madge Networks, Cisco, SynOlptics 13. 14. AT&T,HP Cascade Communications, Motorola DEC IBM, Proteon 16. 17. 18. 13. Data Switch, Proteon 14. Ascend Communications, AT&T 15. Banyan, DEC 16. Retix. Novell 17. Cheyenne Software, Networth 18. ACC Network Systems, UB Networks 19. Stratacom, Vitalink Communicstions 19. Data General, Proxim ADC Kentrox, Ericsson Dynatech Communications. General Datacomm Interphase, Network Equipment Technoloies Data Switch, Lannet Axon Networks, Chipcom Gandalf Technologies, Microcom Artel Communications, Optical Data Systems Alcatel Telecom, Newbridge Networks Banyan Systems, NCR Fore Systems, General Instrument BBN. Intel Lanoptics, Cisco Network Communications. Novell Newport Systems, Networth Network Peripherals, SynOptics Alantec, Wellfleet Communications Applied Network Technologies, Crosscom Aim Technology. Network General 4. 5. 1. 2. 3. AM Communications, Scientific Atlanta Centillion Networks, Olicom USA 4. 6. 7. Ascend Communications, PictureTel Corp. Dayna Communications, Xircom Cabletron, Concord Communications NetEdge, NorTel 9. 10. II. 12. Light Stream, Tellabs ShivaSpider Ancor Communications, Sun Microsystems Aironet Wireless Communications, Digital 5. 8. CentillonNetworks, FirstVirtualorp Ascom Timepe, Netri, Pacific Communication Sciences Ocean 15. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. Note: Firms highlighted in bold have centrality above the means and those underlined have centrality one standard deviation above the means. The subgroups in each period were identified directly from Figures 5, 6, and 7. There are 40 and 21 alliance agreements in the core and the periphery structures respectively but the two experts were not aware of this dichotomy. Each of the two 32 A summary of other alliance agreements is included in Tables E- 1, E-2, and E-3 of Appendix E. 36 expert coders spent approximately three hours in coding the agreements, separated in time and place. Among 61 alliance agreements, one was discarded from the sample since both coders identified that it was unrelated to any form of technological development. El (the engineer) was unable to determine the nature of 21 agreements but he attempted to code 8 of them anyway. However, E2 (the research scientist) coded all 60 agreements. Among 47 dual coded agreements, 17 (36%) were coded as modular by one coder and incremental by the other. El also identified four architectural innovations which E2 coded as either incremental or modular innovations. Columns A and B of Tables D-1, D2 and D-3 show the coding by E2 and El respectively. In fact, after coding both experts raised some concerns about their judgments, which might explain the variation in coding. They were not sure whether to assess the technical outcomes of joint development activities or the original technologies brought by individual partners. Joint development activities were critical to the original innovations when the concepts of these innovations were still relatively new. However, the same activities were later considered trivial after such innovations had been widely spread. Based on his in-depth knowledge of the industry history, E2 concluded that the timing of joint development activities relative to the development of the original technologies is an important criterion. He made his decisions using the following guideline: if the time interval between the original and the joint development is within a couple of years, the characteristics of both activities would be considered together in coding the agreement; otherwise, the joint development activities alone would be coded within the taxonomy of 37 innovation in Figure 3. Another concern raised was whether to consider either or both the technical and market implications of innovations. However, such criteria were not obvious in the taxonomy of innovations. Both experts therefore coded the agreements strictly based on the technical changes implied by the relevant activities. To reduce the errors in coding, E2 offered to reassess all 21 agreements found disparate in both sets of answers. Prior to the second exercise, we also identified 10 additional agreements which created inconsistency in E2's coding. E2 finally went through 31 agreements the second time and found that he needed to change 5 (16%) of his original answers. Two of these changes are now consistent with the results by El but three others are not. Unfortunately, El was not available to do the same exercise and so further comparison is not possible. Given that the results by El are incomplete, Table 8 shows the statistical summary of the results by E2 only. Table 8. The Nature of Innovations Associated with the Core-Periphery Structure Table D-1 (1985-1989) Table D-2 (1990-1993) Table D-3 (1991-1996) Arch. Mod. Incr. Arch. Mod. Incr. Arch. Mod. Incr. Total Core 0 4 2 0 5 6 I 12 9 39 Periphery 0 0 2 0 2 8 0 4 5 21 Total 0 4 4 0 7 14 1 16 14 60 Note: Arch. = Architectural innovations, Mod. = Modular innovation, Incr. = Incremental innovation. These results are coded by E2. Only one architectural innovation is identified in all agreements, achieved within the core structure of firms. The core structure also consists of 21 (54%) modular innovations and 17 (44%) incremental innovations. 38 The distinction between the two numbers appears to be marginal but the number of modular innovations has increased by more than 100% from the second to the third period. On the other hand, 6 (29%) modular innovations and 15 (71%) incremental innovations are identified in the periphery structure. The analysis of variance (ANOVA) shows that the core-periphery structure of the industry can indeed be differentiated by modular and incremental innovations at the 5% statistical level. In technology alliances, core firms were more likely to develop modular innovations whereas periphery firms develop incremental innovations. The above results raise several questions about the relationship between coreperiphery structure and modular-incremental innovation. Do firms that persist in alliance formation also tend to develop modular innovations internally? Likewise, do firms that seldom form alliances also tend to focus on incremental innovations? In the two experts' opinion, an attempt to classify "modular firms" versus "incremental firms" may prove to be futile since many technical details internal to the firms are not obvious nor available for systematic analysis. Perhaps a more relevant question is whether modular innovations are better achieved through partnerships for certain firms and incremental innovations for others? A modular innovation replaces the core concept of a component layer with completely new functionality but leaves other layers unaffected. Modular innovations thus have considerable implications on cost-performance and interoperability (or compatibility) across heterogeneous network environments, subsequently affecting many competitors, suppliers as well as customers (Christensen 1992a). 39 As such, forming alliances to develop modular innovations with competitors, suppliers or customers can gain greater support for interoperability that is demanded in the entire market. Cooperation with potentially "powerful" partners may even enhance the visibility and status of the focal firm in the industry (Baum & Oliver 1991). The alliances formed between 3Com and Microsoft to develop OS/2 LAN Manager in the late 1980s probably best illustrate the above proposition. Their modular innovations, as shown in column A of Table D-1, were networking software compatible with the IBM networking environment. Robert Potter, former president and CEO of Datapoint Corp., which commercialized the first LAN technology ARCnet, observed, "[The biggest story of 1988 was] the rapid movement of PC network software vendors away from proprietary protocols and software and toward the IBM and Microsoft standards." 3 3 In contrast, incremental innovations add new functionality to a component layer and enhance interfaces with adjacent layers. Little disruption to the basic network architecture will be incurred. For example, the first four agreements under the periphery structure indicated by Column A of Table D-2 illustrate the implementation of new functionality in established technologies such as bridges and routers (which are Layer 2 and Layer 3 technologies respectively) to support FDDI or Frame Relay (which are both Layer 2 protocols.) Besides the nature of the innovation, are there other factors that possibly explain the correlation between core-periphery structure and modular-incremental innovation? 40 Assuming that specific position of the firm in the network can influence the technological options pursued by the firm, different insights will accrue to individual firms in the same network (Burt 1992b). Individual firms have made investments in their relations with others and developed knowledge about their parts of the network (Hakansson and Johanson 1988). Increasing networking experience and information benefits bring better opportunity to implement competing and/or complementary technologies. In contrast, the lack of such opportunity limits the extent to which internally developed technologies can affect the market. Thus, firms in the core of the network are better positioned to jointly develop innovations with greater technical implications than those firms in the periphery of the network. If, however, the relationship between core-periphery structure and modularincremental innovation is a spurious one, factors that may cause the two events independently are the costs and complexity of existing technologies. When such costs and complexity are high, firms tend to share risks and costs with their partners (Contractor & Lorange 1988). Under similar conditions, more modular innovations are undertaken to replace mainstream technologies within a component layer. Even when a firm's innovations replace its old technologies, the firm can gain a first-mover advantage in entering new markets (Christensen 1992a). The continuing growth of Sun Microsystems in rapidly changing environment can in fact be explained by the firm's ability to introduce "economies of substitution", whereby technological development involves replacing 33 only certain components NetworkWorld, December 26, 1988. 41 while retaining others (Garud & Kumaraswamy 1993). Under these circumstances, neither network position nor the nature of the innovation has causal implications for one another. Given that core-periphery structure and the nature of the innovation may covary because one variable causes the other or because a third variable causes both, the study does not have sufficient data to prove one or the other of these three possibilities. However, the stability and the significance of core-periphery structure have raised many important implications for future studies of alliances and innovations. The instability of some firms in alliance formation may not be just a case of random noise but instead reflects a distinction between a core set of relationships that are important in the industry and a periphery set of relationships that are important only on some occasions. 7. Discussion and Conclusions With 12 years of alliances among the 150 sample firms in the data communications industry, the longitudinal data in the study have presented strong evidence for some regularity and stability of the industry network. The network structure is best described in terms of core-periphery, whereby a small number of firms are seen repeatedly in the core of the network and many others are in the periphery forming sporadic relationships. The core-periphery structure appears to be fluid in that some firms enter and exit at the periphery of the network whereas others move from the periphery and then remain in the core of the network. Instead of being the targets for acquisition, members of the network have become more likely to acquire non-members. 42 Moreover, core firms are more likely than periphery firms to make acquisitions. Several interesting questions have been raised about the motives for alliances and acquisitions underlying the core-periphery structure. In social network theory, the emergence of networks is a result of resource mobilization in the organizational field (Granovetter 1992). As discussed in section 5, sources of network stability are related to one or more factors, namely, transaction costs, information benefits and degree of resource dependency. In addition, the acquisition activity in the industry does not appear to have an impact on network stability. The sociological argument further informs us that the sources of network variability are contingent upon the specific position of the firm in the social network. More important, the innovative behavior of the firm can be influenced and constrained by its own set of past relationships. Further analysis in Section 6 based on limited data shows that the set of core ties is associated especially with modular innovations whereas the set of periphery ties is associated more frequently with incremental innovations. Neither core nor periphery alliance relationships have generated radically new innovations and few architectural innovations are found. What about the nature of technologies possessed by the 57 nonmembers and 13 members of the industry network that were acquired by both core and periphery firms? In addition to some incumbent firms in the industry, the set of nonmember firms also includes new entrants.3 4 Existing studies of technological innovation assert that new entrants are more likely to have radical and competence-destroying innovations (Tushman & Anderson 1986; Utterback & Suarez 1993). 43 Although such innovations have not been detected in this research, it is conceivable that acquisitions have been made in order to invest in such potentialities. Since the search for more qualified and willing experts takes time, the attempt to code the acquired technologies will be explored in future research. The above concern in fact points out a major limitation of the study in its original intent to exclude analyses of firms not participating in the network driven by technology alliances. The difficulty of conducting research built upon social network theory is to define the boundary for a system of organizations and to link the structure of social relations to the behavior of the firm (Marsden 1990). "Is the population the right unit of analysis?" was raised by DiMaggio (1994), a question remaining most problematic and yet challenging to researchers who are interested in the sociology of organizations. What defines the boundary of the network in the study is an arbitrary artifact which could be eliminated if all 496 industry firms are included in the sample. Those firms that have been identified as non-members can be viewed instead as potential members of the industry network. Moreover, about 53% (85 out of 160) of the acquisitions from 19851996 were made among the non-members. Analyses based on the population data would no doubt enlighten us on all the questions uncovered in this study. In spite of the limitation, the findings presented so far remain valid for the core-periphery structure of interorganizational networks. Existing studies of technological innovation have identified other patterns of network structure. 34 Barley, Freeman and Hybels (1992) found in the biotechnology The term new entrants refers to start-up firms and established firms from other related industries. 44 community that their clustering results are consistent with the generalist-specialist structure in population ecology. Moreover, variation in alliance activity is associated with firms whose attributes differ in a coherent fashion. In contrast, Kogut, Shan and Walker (1992) showed that network structure rather than firm attributes affects the decision to cooperate in the biotechnology industry. In their follow-up study, they found that the structural position of the firm, as a proxy for the amount of social capital, is a strong predictor of network formation (Walker et al. 1997). Finally, based on the similarity of firm capabilities, Nohria and Garcia-Pont (1991) identified complementary blocks and pooling blocks as significant structural patterns of the automobile industry network. The above studies have alluded to network positions and firm attributes as potentially important factors in interorganizational dynamics. Besides network positions and firm attributes, the highly interdependent, complex and yet standardized properties of the data communications technologies appear to be additional conditions for alliances and innovations. Successive innovations in this market are defined by both how well they interoperate with and how much they differentiate from competing products. In many instances, alliances bring not only complementary technologies but also competitive information about competitors' products. The description of technological innovation here is akin to the concepts of "new technological systems", "large technological systems" and "open systems" explained by Freeman (1994), Hughes (1987) and Tushman and Rosenkopf (1992) respectively. Tushman and Rosenkopf (1992:312) argue that "the more complex and/or open the product, the greater 45 the technical uncertainty and the greater the intrusion of organizational dynamics in technological evolution." They further posit that interorganizational dynamics are heightened only when core technologies are threatened (Rosenkopf & Tushman 1994). The findings in this study have implied that firms in the core of the network seek new technological opportunities through horizontal cooperation. These findings are also in accord with the observations made in the development of complex flight simulators (Miller, Hobday, Leroux-Demers & Olleros 1995). Therefore, the core-periphery structure of the industry network may not be unique to the data communications industry. 8. Directions for Future Research The concept of interorganizational networks is not yet fully defined and understood in the study. A good definition of interorganizational networks is one that refers to its significant structural patterns, the governance mechanisms, as well as the conditions underlying network formation, stability and decline. Jones, Hesterly and Borgatti (1997) broadly define networks of firms in the following: "network governance [that] involves a select, persistent, and structured set of autonomous firms (as well as nonprofit agencies) engaged in creating products or services based on implicit and openended contracts to adapt to environmental contingencies and to coordinate and safeguard exchanges. These contracts are socially and not legally binding." As demonstrated in the study, short-term formal agreements involving technological development also have potential impact on emerging relations in the industry. Therefore, two general research 46 questions are: 1) What are the differences between formal and informal networks of firms? 2) Under what conditions is one form of networks more salient than the other? Jones and her colleagues argue that better understanding of these conditions have implications on adaptation, coordination and safeguarding in network governance. A more specific research question arising from this study is what factors determine the role between core and periphery firms (or high-centrality versus lowcentrality) and how these factors shape the emergence of new technologies. If technological attributes are fundamental to the dynamics of core-periphery network, the interaction and replication processes among organizations add a new dimension to the evolution of new technologies (see Figure 8). Central to the co-evolutionary concept of organization and technology are the interactions between organization and technology and the feedback of their interactions to firm behavior and technological attributes (Baum & Singh 1994; Rosenkopf & Tushman 1994; Van de Ven & Garud 1994). From a system dynamics viewpoint, both positive and negative feedbacks are possible in the relationship between organization and technology. Understanding both technological and organizational attributes will shed light on the conditions under which positive feedback loops are more likely than negative feedback loops. Therefore, the co-evolutionary setting for an open, complex technological system may extend the linear models of "dominant designs" and stage-evolution explained in Abernathy and Utterback (1978) and Tushman and Anderson (1986). 47 Figure 8. Dynamic Feedback Loops of Organization and Technology Technology Organization However, an attempt to draw any theoretical implications of the co-evolutionary process is both difficult and frustrating since our understanding of the potential impact of interorganizational relationships on technological performance is still limited. More empirical research using rigorous statistical methodology is required to examine the roles of core and periphery firms in affecting their technological outcomes. In fact, the dynamics of core-periphery structure is consistent with the sociological explanation of embedded relations as the social capital of the firm (Burt 1992a; Granovetter 1992). The social capital of the firm is the amount of resources that have accrued to the firm by virtue of maintaining direct and indirect relationships with other firms in the same organizational field. The behavior of the firm, and hence its technological performance, is constrained and influenced by its ability to gain access to the social capital in the environment. On the contrary, alternative theories suggest that firm attributes might be a more important determinant of firm behavior. The resource-based view of the firm infers that a firm's internal resources are distinctive capability sustaining the competitive advantage of the firm (Barney 1991; Wernerfelt 1984). Similarly, Teece (1986) argues that a firm 48 must have control over the necessary complementary assets in order to implement its innovation successfully. Yet in another viewpoint, Rosenbloom and Cusumano (1987) posit that learning and consistency of management strategies are key to successful innovation. While attributes of firms such as internal capabilities and resources are important sources of innovations, the differential access to information and resources through interorganizational relationships is also a potential source of firm heterogeneity that cannot be ignored. Therefore, an empirical contribution to the field of economic sociology and technology management would be to assess the relative importance of firm attributes versus structural position in affecting technological performance of the firm. 49 Appendix A. Synopsis of Local Area Network Standards and Technologies Local area networks or LANs are used to connect computers located within a single building or a localized group of buildings.' PC-based LANs generally include a network file server, network operating system, cabling and connectors, adapter cards, shared peripherals such as printers and facsimile machines, and applications software. Adapter cards that support the type of standard protocol configured in a network, like 3Com EtherLink PC card for Ethernet network, provide the basic connection from PCs to the network cables. Internetworking devices such as bridges, routers, gateways, hubs, and switches are installed when data exchange between networks is necessary. Figure A-1 below shows three LANs being connected to a backbone LAN by two bridges and a router. The backbone in turn is connected to a wide area network called PSDN by a switch. The early application of LANs was to enable distributed workstations to access an electronic mail server or a laser printer. Today, sophisticated applications involving the transmission of documents incorporating images and other media are becoming common, increasing the demands on the capacity of LANs. Devices known as switches are used to interconnect LAN segments in order to meet the demand for higher bandwidth. For greater physical separations of LAN segments, high speed LANs will be used as backbone. Another type of network is wide area networks or WANs, which are composed of multiple establishment-wide LANs. WANs can be classified into two categories: public data networks (PDNs) and private networks. PDNs are installed and managed by the public carriers while private networks are by large national and multinational corporations. Private networks are also known as enterprise-wide networks. The two LAN standards that have been widely adopted are Ethernet-based (such as 10Base-T) and Token-ring networks. As for internetworking between LANs and WANs, one of the important considerations is the standard for providing end-to-end network services to local users. End-to-end network services are delivered such that the possible presence of multiple networks is made transparent to the users. At present, two competing internetworking standards provide these network services, namely, ISO Internet Protocol, 2 and A useful academic reference text is by Larry Peterson and Bruce Davie, "Computer Networks," 1996, San Francisco, California: Morgan Kaufmann Publishers, Inc. 2 Founded in 1946, ISO is an international standards organization composed of national standards 50 Internet Protocol (IP) that is used by the Internet (formerly known as ARPANET). Issues that are related to how network services should be provided are called network management, which includes network maintenance, addressing, routing, error and flow control. Owing to the complexity of data communications, a reference model for the structure of a communication system has been formulated so that the standards associated with different levels of the system can be simplified. Figure A-2 below presents the International Standard Organization (ISO) Reference Model for data communications between two computers. Figure A-3 illustrates the network environment of the ISO Reference Model and the technologies which are included for this study. The ultimate goal of interconnectivity is to achieve an open system interconnection environment. That is, a set of application programs, running on different computers connected by proprietary networks, are enabled to perform distributed applications. This high level of connectivity is further supported by two different standards, i.e., Open Systems Interconnection (OSI) suite and Transport Control Protocol/Internet Protocol (TCP/IP). Both standards support specific application protocols such as remote access and mail service. The most popular applications currently supported by TCP/IP, for example, are electronic mail system and Netscape. bodies from over 75 countries. For example, ANSI (American National Standards Institute) is a member of ISO. ISO has defined a number of important computer standards, the most significant of which is perhaps OSI (Open Systems Interconnection), a standardized architecture for designing networks. See http://www.sandybay.com/pc-web/ISO.htm. 51 Figure A-i. LAN-based Data Communications Networks* Figure A-2. International Standards Organization (ISO) Reference Model* Computer A Computer B -- I Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Transport Layer Session Layer Transport Layer Network Layer Network Layer Link Layer Link Layer Physical Layer Physical Layer r I Data Network Network environment OSI environment Real systems environment 52 1 0 Figure A-3. Network Environment - Standards and Technologies* 4 Transport Layer Transmission Control Protocol (TCP)* or User Datagram Protocol (UDP) 3 Network Layer Internet Protocol (IP) 2 Data Link Layer Logical Link Control IEEE 802.2 Medium Access Control IEEE 802.3 Ethernet IEEE 802.4 Token Bus Transmission Medium * Bridges. Switches function with dissimilar LANs IEEE 802.5 Token Ring I 1 Physical Layer Gateways works at Network Layer and above Bridges, Switches function with similar LANs; Routers work in both Network and Data Link Layers Repeaters and network interface cards operate at the physical layer; Coaxial cable is by far the most popular medium implemented for LANs All three figures are adapted from Fred Halsall, "Data Communications, Computer Networks and Open Systems," 1996, (Fourth Edition), Addison-Wesley. 53 Appendix B. Social Network Analysis using UCINET IV3 Output of Geodesic Distances among Pairs of Firms, 1985-1988 Table B-1. DISTANCE ADJACENCY Type of data: NONE Nearness transform: C:\UCINET\NETWOR KI\D85-8LSC Input dataset: For each pair of nodes, the algorithm finds the # of edges in the shortest path between them. Length of optimal paths between all pairs of nodes: 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 5 6 7 3 4 1 2 3COATTCHPCODCPQCDSDCADECDSCEXC HPIBMINTMDGMCT MSNETNVLORCRABRTXSCOSTRSNPSYTUBNWSDSMC 13C0 2 ATT 3 CHP 4 COD 5 CPQ 6 CDS 7 DCA 8 DEC 9 DSC 10 EXC 11 HP 12IBM 13INT 14MDG 15 MCT MS 16 17NET 18NVL 19 ORC 20RAB 21RTX 22SCO 23 STR 24SNP 25SYT 26UBN 27 WSD 28SMC 0 3 4 1 4 4 1 3 4 3 1 3 4 3 4 2 4 5 4 5 3 3 4 6 2 4 7 5 4 3 0 7 7 0 4 3 7 2 7 2 4 5 6 1 7 2 2 7 5 2 7 2 1 8 7 2 1 8 1 6 3 8 9 4 8 3 4 9 7 2 2 7 7 2 5 10 5 2 3 8 611 2 9 1 4 4 4 7 7 2 2 3 3 3 0 3 0 2 3 2 0 2 5 5 2 1 1 2 2 3 7 7 4 2 5 5 7 7 4 5 8 8 7 4 7 5 8 8 3 6 6 5 8 8 6 9 9 5 8 8 6 9 9 7 4 7 4 7 7 3 2 2 7 10 10 1 2 2 5 8 8 8 1111 6 9 9 4 1 3 4 6 7 5 1 2 3 2 2 2 5 1 2 5 1 5 0 4 1 4 0 0 5 1 7 4 6 5 2 4 6 7 4 5 7 8 7 4 6 7 8 5 6 3 5 7 8 5 6 8 9 7 8 5 6 8 9 7 4 6 7 4 6 2 5 1 7 9 10 3 1 2 7 8 5 81011 6 8 9 3 2 7 4 7 7 4 6 7 0 2 2 3 2 3 1 3 2 1 4 2 2 7 3 5 3 4 4 3 2 7 4 7 7 4 6 7 1 2 5 2 5 5 2 4 5 2 2 0 2 3 2 3 1 3 4 3 4 2 2 5 5 3 3 6 4 2 0 3 2 3 1 1 4 3 4 2 2 7 5 5 3 6 4 4 1 8 5 8 8 5 7 8 2 3 3 2 3 3 0 3 2 2 4 5 4 5 3 3 8 6 6 4 7 1 4 1 8 5 8 8 5 7 8 3 2 7 4 7 7 4 6 7 1 3 4 3 4 2 1 3 1 3 4 3 4 8 6 8 6 3 9 1 76 6 4 6 5 3 4 2 4 1 3 5 7 2 6 7 5 6 5 4 3 3 7 5 6 4 2 4 2 0 4 3 2 7 4 7 7 4 6 7 2 2 3 2 3 3 5 3 2 4 4 3 4 0 3 4 2 4 8 9 3 3 75 1 3 4 4 6 4 5 4 7 4 6 2 3 6 2 7 5 5 9 810 2 811 2 6 5 8 3 7 1 810 2 811 9 2 811 9 2 810 2 6 5 8 5 7 3 710 8 1 9 1 810 2 811 9 2 3 44 7 3 5 3 64 5 3 2 5 64 7 5 5 3 471 8 6 6 6 4 7 5 5 3 4 7 3 8 6 6 2 5 3 4 4 1 6 8 6 6475 7 1 26 9 1 4 6 3 8 3 6 7 1 4 9 3 5 3 6 4 5 2 7 4 3 6 7 5 5 811 9 7 010 2 17 8 2 510 0 7 0 6 9 2 8 5 3 8 2 6 0 9 3 0 8 611 1 0 9 7 7 5 8 3 2 7 4 7 7 4 6 7 2 2 4 4 5 4 5 3 4 3 4 5 0 2 2 3 4 3 3 2 0 5 4 5 2 3 2 3 4 4 5 4 5 5 4 9 6 9 9 6 8 9 4 3 8 5 8 8 5 7 8 1 2 1 4 3 4 0 2 5 4 9 6 9 9 6 8 9 3 1 1 2 1 2 4 5 4 5 2 3 1 3 3 2 3 0 2 3 0 3 4 3 8 5 8 8 5 7 8 2 1 6 3 6 6 3 5 6 2 3 2 3 1 3 4 3 4 0 0 7 5 5 3 6 4 Distance matrix saved as dataset C:\UCINETNETWORK9\D85-8D Elapsed time: I second. 1/29/1998 9:37 AM. UCINET IV 1.66/X Copyright 1991-1996 by Analytic Technologies. 3 Borgatti, Everett and Freeman, 1992, UCINET IV, Columbia: Analytic Technologies. a software program for social network analysis. For more information see http://www.heinz.cmu.edu/projectINSNA/softinf.html 54 UCINET IV is Table B-2. Output of Multidimensional Scaling (MDS) Coordinates among Pairs of Firms based on Geodesic Distance, 1985-1988 NON-METRIC MULTIDIMENSIONAL SCALING Input dataset: C:\UCINET\NETWORK9\D85-8D TORSCA Dissimilarities Starting config: Type of Data: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 3CO ATT 3C1 COD CPQ CDS DCA DEC DSC EXC HP IBM INT MDG MCT MS NET NVL ORC RAB RTX SCO STR SNP GEl TND WSD SMC 1 2 -0.30 0.32 -1.47 -0.60 -1.49 -1.45 -0.40 -1.18 -1.36 0.48 0.00 0.50 0.30 0.46 0.21 0.30 0.79 1.00 0.56 1.20 0.27 0.31 -1.41 1.21 -0.89 0.90 1.37 0.36 -0.02 0.51 -0.21 -0.07 -0.09 -0.31 -0.09 -0.24 -0.54 -0.05 0.06 0.35 0.84 0.18 0.78 0.17 0.56 -0.46 -0.34 -0.20 0.29 0.10 -0.42 -0.70 -0.16 -0.18 -0.94 1.18 Coordinates saved as dataset C:\UCINET\NETWORK9\D8COORD Note: Several starting configuration methods to locate the firms are available under non-metric MDS technique in UCINET: Metric -Gower's metric coordination procedure; Torsca - principal components of rank-order data; Random - locates points randomly in space. Torsca was applied to the dataset in this study. See Table B-3 for MDS output. 55 Table B-3. Output of MDS Map based on Coordinates in Two-dimensional Space Dim 2 1.26 SMC 0.66 MCTNT ATT RTX 0.06 NET IBM MDG SCO HP CPQ 3C1 COD DCACO EXC GEl TND RAB DEC -0.54 CDS STR DSC ORC NVL SNP WSD -1.14 -1.13 -0.55 0.03 0.61 1.19 Dim 1 Stress in 2 dimensions is 0.041 Elapsed time: 1 second. 1/29/1998 8:49 AM. UCINET IV 1.66/X Copyright 1991-1996 by Analytic Technologies. 56 Appendix C. Centrality In social network analysis one of the commonly used measure is centrality, which can identify the most "important" or "prominent" actors in a social network. According to a review of social network analysis (Freeman 1978), the idea of centrality as applied to human communications was introduced by Bavelas at the Group Networks Laboratory at M.I.T. in the late 1940s. The studies conducted by the research group under the direction of Bavelas found that centrality was related to group efficiency in problem solving, perception of leadership and the personal satisfaction of participants (Bavelas 1948; Bavelas & Barrett 1951). Three types of centrality measures have been used to quantify the prominence of an individual actor embedded in a network: degree, betweenness and closeness (Freeman 1978; Wasserman & Faust 1994). Degree centrality of an actor is the simplest measure of the number of ties (degree) to all other actors (nodes) in a graph. The most central firm is considered to be the most active actor in the network. Betweenness centrality measures the number of intermediaries between two nonadjacent actors. These "other intermediate actors" potentially might have some control over the interactions between the two nonadjacent actors. If an actor lies between many of the actors via their shortest paths, it is said to have high centrality in the network. Closeness centrality measures how central or close an actor is to all other actors. This is the same as finding minimum distances to all other actors and the idea is that the more central the firm the lower the cost or time for communicating information to and from all other actors. Assuming that the shortest (geodesic) distance between two actors is d(ni, n), the sum of the geodesic distances from actor zi to all other actors lnjis given by g d(ni, nj) where j i. ji= For example, in a star network with 5 actors connected to a single actor in the center, the sum of the geodesic distances for the central actor is 5 (1 + 1+ +1+ 1) whereas the sum for each of the 5 other actors is 9 (1+2+2+2+2). The closeness centrality index for actor ni based 57 on Sabidussi's method (Freeman 1978) is given by C(ni) = d(ni, ni' The closeness centrality index generated in UCINET IV is normalized by dividing the actor's index by the maximum possible closeness centrality index, i.e. (g-l)-', in the network. The standardized index ranges between 0 and 1. When the index equals unity, it means the actor is maximally close to all other actors. When the index equals zero, one or more actors are not reachable from the actor in question. However, the closeness centrality measure is only meaningful for a connected graph, i.e. every node is reachable from all other nodes. Otherwise, if one node is not reachable, then the distance from all other nodes to this specific node is infinitely long and the distance sum for every actor is oo. The input to closeness centrality is a symmetric binary matrix, i.e. when the number of alliances is 1 or greater between two actors, the value will be 1, otherwise 0. 58 Appendix D. Cohesive Subgroups and Technological Developments, 1985-1988, 1989-1992, 1993-1996 Table D-1. Cohesive Subgroups and Technological Developments, 1985-1988 Cohesive Subgroup Technological Development Coder Ratings A B In 1985, Intel, Microsoft and UB Networks announced a strategic development and marketing agreement for Intel's Open Net system, one of the key features of which is compatibility with PC Network by IBM. In 1988, UB Networks signed an OEM licensing agreement for Microsoft's LAN Manager and intended to extend its current product capabilities to an OS/2 base. In 1985, Novel and 3Com formed agreements with Microsoft to obtain MS-DOS 3.1 and MS Network software, designed to be closely compatible with IBM's PC-DOS 3.1 and PC Network software. In 1987, 3Com jointly developed the OS/2 LAN Manager with Microsoft; in addition, both companies jointly made sales calls to large corporate users. 3Com also developed 3 open, network system software based on the LAN Manager. NET has benefited from its 2-year-old joint development and marketing relationship with IBM in the T- I market. In separate cooperation with Sytek and 3Com, Codenoll has come up with fiber optic versions of the two companies' network adapter cards. AT&T and Intel jointly developed their integrated services digital network (ISDN) microchips compatible in a move that would give ISDN terminal makers more choices in designing products. Novell's agreement with Oracle used Excelan's TCP/IP Workstation software and Novell's TCP/IP Gateway software to provide transaction processing through links between LANServer and PC workstations. Oracle customers will be able to use Netware to connect with a variety of network schemes, including Ethernet, token-ring networks and Arcnet. M I M I I ? M M M M I M I M I M CORE 1985, 1988 Microsoft and UB Networks 1985, 1987 Microsoft and 3Com 1988, IBM and Network Equipment Technologies 1986, Codenoll Technology and Sytek 1986, AT&T and Intel 1987, Oracle, Novell, Excelan PERIPHERY 1988, SynOptics and Western Digital 1988, Chipcom and DEC SynOptics' LattisNet 10-Mbps Ethernet transceiver will be incorporated into a version of Western Digital's EtherCard Plus network interface card for the IBM PC XT and AT, PS/2 Model 30 and compatibles. The Ethermodem III Bridge is the result of a joint development agreement between Chipcom and DEC. Based on DEC's LAN Bridge 100 architecture and Chipcomr's broadband transceiver technology, the bridge links Ethernet subnetworks to a broadband Ethernet backbone. Source: Lexis/Nexis, 1996/7. Note: A is E2 (Research Scientist) and B is El (engineer). M - Modular Innovations, I - Incremental Innovations, A - Architectural Innovations 59 Table D-2. Cohesive Subgroups and Technological Developments, 1989-1992 Cohesive Subgroup Technological Development Coder Ratings A B The three companies put together LAN II, consisting of multiple protocols and multiple networks. It's a workstation solution intemetworked with a mainframe solution. NSC provided the HyperChannel series of high-speed networks used to connect supercomputers and mainframes. Excelan is focused on networking workstations, minicomputers and PCs. Wellfleet developed Ethernet bridges and routers for linking M M M M M M I I I M I I I M M M M M l I I ? CORE 1989, Excelan, Network System Corp. and Wellfleet Communications. LANs and WANs. 1990, Cisco and Madge HP and 3Com developed products together and cooperated in worldwide joint service. In promoting single interface, HP embraced 3Com's networking scheme to tie its minicomputers to other vendors' hardware. The firms announced six areas of product development focused heavily on standards such as TCP/IP, CCITTs X.400 and the Open Systems Interconnect model. DEC offered a licensing program for its Local Area Transport (LAT) protocol, saving third-party vendors the trouble of having to reverse-engineer the popular terminal-toVAX networking specification. Banyan integrated networking products with LAT. Cisco licensed Madge's Fastmac data buffering and transfer software for use in Cisco's Networks Token-Rine routers. 1990, 1991, Cisco and SynOptics In 1990, they jointly developed a router module for Synoptics' LattisNet wiring concentrator. In 1991, SynOptics, Cisco and SunConnect jointly developed the nextgeneration, integrated routing hub for Ethernet. Token Ring, and FDDI, dubbed the RubSystem. In another joint development agreement, Cisco and Synoptics integrated routers with the wiring hub. Madge announced a licensing agreement with SynOptics for Madge's FastMAC TokenRing software. FastMAC Token-Ring and Bridge Management software package would be incorporated into SynOptics' LattisNet Token-Ring product line. IBM and Chipcom jointly developed intelligent hubs to link heterogeneous computers and networks into enterprise networks. The partnership helped IBM fill a gap in its internetworking product line. NS agreed to license ATM interface designs from Adaptive Corp., a unit of NET, and used the technology to develop multimedia computer and high-speed networking 1989, 3COM and HP 1989, Banyan and DEC 1991, Madge Networks and SynOptics 1992, Chipcom and IBM 1992, National Semiconductor and NET equipment. 1990, 1992 Retix and Novell 1991, Tiara and Sun (Sitka) 1992, Ascend Comms. and AT&T Paradyne In 1990, Novell and Retix in joint development to provide X.400 pathway in MHS LAN. In 1992, Retix joined with Novell to deliver the first X.400 capability to the NetWare Global Messaging environment. Sitka Corp is formerly the TOPS Division of Sun Microsystems. Sitka and Tiara improved the interoperability of two popular network operating systems and provided each system with connections to a wider variety of network environments. AT&T Paradyne and Ascend cooperated in the development and distribution of products for wide-ranging networking applications in the global bandwidth-on-demand marketplace. 60 Table D-2. Cohesive Subgroups and Technological Developments, 1989-1992, Continued Cohesive Subgroup Technological Development Coder Ratings A B UB Networks to integrate Advanced Computer Communications (ACC) multiprotocol bridge/router with UB Access/One intelligent hub. The agreement with ACC was sparked in part by the need to bring branch offices into the corporate network. Data Switch integrated Proteon's LAN products into its data processing and communications switching and control systems. Vitalink Communications and Stratacom had a joint-development effort through which Vitalink bridges and routers will support Stratacom's Frame Relay Interface. Lanex and Codenoll Technology entered into a strategic alliance to develop additional technology and products for Fiber Distributed Data Interface (FDDI) networks. They jointly developed GatorMIM CS media interface module. The device is an Apple Talk-to-Ethernet media interface module, based on Cayman's gateway technology, that plugs in to a Cabletron Multi Media Access Center Ethernet hub. Bytex incorporated CrossCom's next generation token-ring bridging technology in its Maestro Intelligent Switching Hub. Maestro is a matrix-switching hub that lets users remotely configure and manage the physical links of their token-ring LANs. The two companies jointly developed network management software for NetWorth's 10Base-T concentrators. Netrix and Pacific Communication Sciences had a joint-development agreement that let each company rely on the other's expertise for integrated circuit-packet switches and voice-compression techniques. Ericsson expanded its relationship with Luxcom to jointly develop a collapsed backbone that supports multimedia applications. I M I M I M I I M M I M I I I A I A M M PERIPHERY 1990, ACC Networks and UB Networks 1990, Data Switch and Proteon 1990, Stratacom and Vitalink Comms. 1990 Codenoll Technology and Lanex 1991, Cabletron and Cayman Systems 1991, Crosscom and Bytex 1991, Networth and Cheyenne Software 1991, Netrix and Pacific Communication Sciences 1992, Ericsson and Luxcom 1992, Tellabs and Fujitsu Network Systems Fujitsu Network Systems and Tellabs used WAVE to make history, providing the first mid-span meet of synchronous optical network (SONET) equipment that included a link of data communications channels. Source: Lexis/Nexis, 1996/7 61 Table D-3. Cohesive Subgroups and Technological Developments, 1993-1996 Cohesive Subgroup Coder Ratings Technological Development ~~______ ~~~A B CORE 1993, Interphase and NET 1993, SynOptics and Network Peripherals 1993, Networth and Newport Systems Solutions (NSS) 1993, Network Communications Corp. (NCC) and Novell 1994, Chipcom and Axon Networks 1994, Ascend Communications and PictureTel 1994, Alantec and Wellfleet Communications 1994, Network General Corp and AIM Technology 1994, Crosscom and Applied Network Technology (ANT) 1994, Lanoptics and Cisco 1994, LightStream (LITES) and Tellabs 1994, 1995, Proteon, IBM and Dec 1995, 3Com and Bay Networks 1995, AT&T and HP 1995, 1996, Cascade Communications and Motorola NET and Interphase developed ATM adapter cards to link workstations to ATM networks. M M Network Peripherals and SynOptics jointly developed ATM adapter cards. Network Peripherals built the adapters for EISA, Micro Channel and S-bus architectures using ATM technology from SynOptics. NetWorth licensed NSS' LAN/MPR bridge software for NetWorth's Series 4000 Local Ethernet Bridge. Also, NSS certified the NetWorth NetWare Application Engine (NAE) as a platform for its routers. Novell had a licensing and technology agreement with NCC whereby NCC will acquire exclusive rights to develop, market and support the hardware- based version of Novell's LANalyzer network analyzer. The agreement includes the hardware-based LANalyzer only; Novell continued to develop and market its software-only LANalyzer for Windows product. Joint development of two network monitoring applications for Chipcom's line of intelligent switching hubs that complies with the Simple Network Management Protocol's Remote Network Monitoring Management Information Base (RMON). They have been supplying complementary solutions to their worldwide customers for several years. The Ascend Multiband MAX Bandwidth-on-Demand product provided public network connections for the PictureTel M-8000(2) Multipoint Conferencing family. They had a co-operative marketing and technical support alliance, covering their Backbone Concentrator Node routers and PowerHub products respectively. It covered four key initiatives: interoperabilitv testing, technical training, co-ordinated technical support, and joint sales and marketing. They integrated their product lines to create end-to-end client/server network management. Network General also bought a 10% stake in AIM Technology, a Unix systems management software provider. AIM used the equity investment to accelerate development of its SharpShooter product, a fault and performance management application for Unix systems. CrossComm signed a technology license agreement with Applied Network Technology for the development of new Ethernet switching technology for CrossComm's XL product line. M M I M I ? I ? M ? I ? I ? M M I M M A M M 9? ? M I M M They jointly developed integrated hub/router products. The Cisco AccessPro router card will be available with StackNet, LanOptics' multi-protocol stackable hub, and packaged with BranchCard. LanOptics' PC based hub card. They jointly developed and distributed ATM switching systems. The two companies negotiated an OEM agreement whereby Tellabs would market LightStream 2010 ATM products. In addition, Tellabs and LightStream planed a technology licensing agreement that would allow Tellabs to develop new features and functions for the LightStrcam 2010 ATM products. In 1994, Proteon had licensed DEC and IBM to use its internetworking software and had extended a previous joint development agreement with IBM to develop remote site router family products. In September 1995, IBM and Proteon reaffirmed their continuing joint development of remote site internetworking products including implementation of the DLSw specification. 3Com and Bay Networks jointly announced a cooperative mutual patent license agreement. The agreement covers all patents presently held by both companies and extends to all patents that will be issued to both organizations during the next five years. AT&T and HP agreed to develop public and private networks using wired and wireless technology to improve delivery of multimedia information and interactive services. In 1995, Motorola teamed up with frame relay switch maker Cascade to develop a terminal adapter that lets remote users run frame relay traffic over ISDN lines. In 1996, Motorola's Multimedia and Information Systems Groups and Cascade agreed to cooperate to provide high-speed Internet access via cable to end-users. The combination of Motorola's CableComm system and Cascade's multiservice switching products will allow increased capacity for high-volume, easilv expandable Internet access. 62 Table D-3. Cohesive Subgroups and Technological Developments, 1993-1996, Continued Cohesive Subgroup Technological Development Coder Ratings 1996, ADC Kentrox and Ericsson 1996, NetEdge and Nortel A B M M M M I ? A A M I M M Microcom formed technology partnership with Gandalf Technologies that allows Gandalf to incorporate Microcom's modem technology into its Xpressway r, central site concentrators. AM Communications and Scientific-Atlanta jointly developed new transponder technology. I M I ? They co-developed a WaveLAN driver for Banyan's VINES network operating system. NCR also initiated a joint -marketing program with Banyan through which Banyan M I M M M M I I l ? Ericsson and ADC Kentrox signed a systems integration agreement to deliver ATM solutions to network operators and service providers. Ericsson will market and sell ADC Kentfox ATM access products for data communications and WANs. The agreement also includes the framework for cooperative development of new ATM products and services. Nortel's LAN Module allows network providers to offer LAN interconnect service on an ATM-over-SONET backbone to multiple customers via the same network connection that also supports voice and narrowband data. The LAN Module incorporates the NetEdge's award-winning ATM edge routing technology. 1996, General Datacom and Dynatech Comms. They successfully demonstrated the interoperability between Dynatech's DynaStar 100 and the GDC APEX(. The combination of these products provides ATM all the way to the access point without multiple network conversions. 1996, Fore Systems and General Instrument 1996, BBN and Intel They jointly developed a high-speed, ATM-based telecommunications network system. The system is designed to enable broadband telecommunications operators to provide high-speed, two-way communication services to computers over hybrid fiber coax (HFC) cable TV plants. BBN has built a trial network to demonstrate that the Resource Reservation Protocol (RSVP) can give the guarantees necessary to ensure that real-time data, as well video, audio and other multimedia elements, get through. The network was designed in conjunction with Cisco, content provider Worldwide Broadcasting Network (WBN) and Intel. 1996, Alcatel and Newbridge Networks They had an agreement that would enable carriers and corporate customers to deliver SONET (Synchronous Optical Network) services from the public backbone network directly to customer premises. 1996, Microcom and Gandalf Technologies 1996, AM Comms. And Scientific Atlanta PERIPHERY 1993, Banyan and NCR VARs can market NCR's WaveLAN wireless LAN product with VINES. 1993, ODS and Artel Communications 1993, Data General and Proximn 1993, Ascom Timplex, Netrix and Pacific Communication Sciences Optical Data Systems and Artel integrated Artel's StarBridge Turbo Ethernet Switch technology into the ODS Infinity Hub. Proxim licensed its RangeLan2 kit to Data General. Data General integrated Proxim's RaneLAN2 wireless LAN technology into a future family of mobile computing systems Since 1991, Netrix and Pacific Communication Sciences have signed a joint-development agreement that lets each company rely on the other's expertise for integrated circuitpacket switches and voice-compression techniques. PCSI is working with Ascom Timeplex to develop a daughterboard that supports the CELP algorithm as well as facsimile transmissions. 1994, Dayna Comms. and Xircom 1994, Data Switch and Lannet Xircom and Dayna Communications launched a joint-development and cross-licensing deal for Apple connectivity products They established ajoint sales, marketing, and technology-sharing agreement to develop and market systems to simplify and reduce the cost of integrating mainframe data centers I with PC-based networks. 1995, Ancor and Sun 1995, Centillion Networks and Olicom 1996, Cabletron and Concord Comms. Ancor Communications and Sun Microsystems jointly developed switched Fibre Channel support for server storage. They developed token-ring and ATM switching solutions incorporating Centillion's Speed Switch 100 and Olicom adaptors. They integrated Concord's Network Health performance analysis and reporting applications into Cabletron's Spectrum, the No. 3 enterprise management platform after Hewlett-Packard's OpenView and Sun Microsystems' SunNet Manager. Source: Lexis/Nexis, 1996/7. 63 M M I A I Appendix E. Other Cohesive Subgroups Table E-1. Cohesive Subgroups and Technological Developments, 1985-1988 Cohesive Subgroup 1986 DEC and CDS 1988 DEC and CPQ 1988 DEC and DSC 1988 DEC and STR 1987 3CO and DCA 1988 TND and RAB 1986 MS and SCO 1988 MS and HP 1988 1988 1988 1988 MS and MDG MS and RTX INT and SMC ATT and MCT Technological Development Concord Data Systems, Inc. has announced a multiyear agreement with DEC to develop General Motors Corp.'s Manufacturing Automation Protocol interfaces for DEC's Microvax computers. Compaq and DEC are developing VAX-to-MS-DOS linkages. DEC and DSC to develop network systems; agreement designed to foster CCS, ISDN, other telecom advancements. DEC's EMA is OSI-based, and according to the company, will accommodate both voice and data requirements and manage SNA and Transmission control Protocol/lnternet Protocol environments. Stratacom will develop interfaces to EMA with its own network management products. 3Com formed alliances with Digital Communications Associates Inc. (DCA). DCA manufactures add-on boards to link microcomputers to mainframes. UB Networks licensed from Rabbit Software SNA technology. Xenix-Net, developed jointly by Microsoft and The Santa Cruz Operation. Xenix-Net provides networking, distributed file system capabilities and transparent file sharing in mixed environments consisting of Xenix System V.2-and DOS-based systems. HP and Microsoft announced their joint strategy for moving the OS/2 Presentation Manager to the Unix environment. Madge Networks licensed Microsoft's OS/2 LAN Manager. Retix licensed Microsoft's OS/2 LAN Manager. Intel and Standard Microsystems Corp. jointly developed LAN Ethernet VLSI. AT&T continued to buttress its support of dominant communications protocols for its 3B processor series through a recent alliance with Micom-Interlan, Inc. that extends Transmission Control Protocol/Internet Protocol, or TCP/IP, functionality to the entire line. Source: Lexis/Nexis, 1996/7. 64 Table E-2. Cohesive Subgroups and Technological Developments, 1989-1992 Cohesive Subgroup Technological Development 1989 CBT and LSI Cabletron and LSI to develop a transceiver chip that complies with the proposed IEEE 10BaseT standard for 10M bit/sec Ethernet over unshielded twisted-pair wiring. Cabletron and Silicon Graphics developed network management system. Cabletron and Fore Systems jointly developed products for ATM technology. Cabletron and Windata developed a wireless LAN module for Cabletron's hub line that will forge wireless links to workstations and other devices. Bytex and Gandalf Data Systems jointly developed token ring solutions. Crosscom and TRW formed alliance in Ethernet, broadband and wan internetworking solutions. General Datacomm, Crosscom jointly developed multimedia intemetworking solutions. Network Systems Corp and Storage Technology Corp developed storage devices for network. Northern Telecom and Network Systems Corp. in Lan/Wan joint product development. 3Com will incorporate Synernetics Lanplex 5000 architecture into its new Linkbuilder 3GH thirdgeneration structured wiring hub. EO licensed Sitka's (un Sun) mobile net solutions. Netrix and Siemens Private Communications Systems jointly developed packet switching products. HP and AMD in 10Base-T Ethernet Lan product development. Codenoll Technology licensed from Western Digital Lan card design and software SynOptics &Farallon Computing integrated Fs phoneNet into S's network platform SynOptics licensed network management software from Remedy Corp Cisco integrated its router with Ultra Network Technology's network To develop CSCO's router to manage Cascade's frame relay network Proteon and Netlink to develop IBM connectivity products AT&T and Intel have signed an agreement to develop personal computers designed to support AT&T's networked computing offerings. DEC and David Systems joint develop SNMP (simple network management protocol) to manage networking products DEC and Microsoft integrated their networking strategies by linking application programming interfaces (APIs) for DEC's Network Application Support (NAS) and Microsoft's Windows Open System Architecture (WOSA). Novell and Network Communications Corp developed internet test and diagnostic instruments Novell and Microdyne jointly developed interface cards Network Peripherals &UB Networks in FDDI concentrator products UB Networks and BBN has been working for UB's ATM and multimedia solutions. Vitalink and Xyplex will work together to develop and market what they claim will be the first interoperable remote bridges from different vendors. 1991 CBT and SIL 1992 CBT and FOR 1992 CBT and WDT 1992 BYT and GDL 1989 XCO and TRW 1991 XCO and GEN 1992 NSC and STO 1992 NSC and NT 1991 3CO and SYN 1992 SUN and EO 1992 NTR and SIE 1989 HP and AMD 1989 COD and WSD 1990 SNP and FAR 1991 SNP and RMD 1989 CSO and ULT 1992 CSO and CSC 1992 PTE and NLK 1989 ATT and INT 1991 DEC and DVS 1992 DEC and MS 1991 NVL and 1992 NVL and 1991 TND and 1992 TND and 1990 VLK and NCC MDY NEP BBN XPL Source: Lexis/Nexis, 1996/7. 65 Table E-3 Cohesive Subgroups and Technological Developments, 1993-1996 Cohesive Subgroup 1995 BAY and MS 1995 1995 1993 1995 BAY and FUJ XIR and NEC TLA and TRW TLA and PRO 1994 SUN and CNT 1993 ATT and PRE 1993 ATT and PNR 1995 ATT and MUL 1993 CSO and XER 1995 CSO and NOK 1995 CSO and TBI 1995 CSO and CPQ 1995 CSO and USR 1996 CSO and MDG 1996 CSO and XPO 1993 SHI and APP 1995 HP and NEV 1995 HP and NSC 1996 HP and CEL 1993 IBM and KAP 1996 IBM and XYL 1994 PRX and ZEN 1994 PRX and LXE 1996 ADK and PAR 1993 NET and NS 1995 DAS and DCM 1994 AXO and RAY 1994 AXO and PHO 1994 CHP and SYN 1993 ODS and SMC 1993 NEW and XYP 1996 NEW and SIE 1993 NCR and NAT 1993 1994 1994 1994 1993 NWT and TND NWT and GRJ SNP and STR SNP and BA2 WFL and MAK 1994 XCO and MLT 1996 NEG and NSY Technological Development Bay and Microsoft formed an alliance that will integrate Bay Networks' Routing Services (BayRS) into Microsoft's Windows NT Server. Bay and Fujitsu Network Switching in joint development of ATM technologies. Xircom licensed to NEC wireless technology. Tellabs and TRW would work together to develop SONET and ATM technology and roducts. Tellabs and Promptus Communications in joint develpment of enhanced inverse multiplexing technology that will benefit the customers of both companies. Sun licensed SNA network software from Computer Network Technology's Brixton Systems Inc. Sun's Sparc/Solaris enterprise. AT&T Paradyne developed with Premisys in network access technology. AT&T Paradyne licensed remote access technology from Penril Datability. AT&T Microelectronics licensed from Multi-Tech Systems the digital simultaneous voice and data TM chip sets. Cisco and Xerox signed a marketing agreement to resell bridges and routers. (This agreement should have been omitted in the study.) Cisco and Nokia to develop ATM technologies. Cisco acquired TBIT's MICA technology and formedan alliance with TBIT. Cisco and Compaq formed licensing and joint development agreement. Cisco and US Robotics to integrated USR's modemand C's routing technology into I box. Cisco and Madge Networks to develop hi-density ISDN switch. Cisco licensed its VLAN Technology to Xpoint. Shiva and Apple developed point-to-point protocol technology. HP and Netvantage integrated 100VG-AnyLAN into both companies' switches. HP and Network Systems manufactuered server channel solutions. HP and Cellnet data system to develop wireless communications technologies and client/server computing solutions. IBM and Kaplana in Token Ring ATM integration. IBM and Xylan in Lan switching product development. Proxim and Zenith Data Sys in wireless computingploduct development. Proxim and LXE Inc in wireless LAN product devement. ADC Kentrox acquired 20% stake in Paragon Networks (wan) to integrate access products. Network Equipment Technology licensed to National Semiconductor ATM software. Data Switch's T-Bar integrated with Datacom Systems' technology to develop new Lan switch products. Axon and Xyplex ointly developed network manament sstems. Axon and Phoenix Microsystems to develop products for the emerging field of LAN/WAN monitoring system. Chipcom and Sync Research integrated S's SNA technology. Optical Data Sys and Standard Microsystem Corp. integrated its bridge and routing technologies into O;s hub technology. Newbridge and Xyplex in ATM development. Newbridge and Siemens in ATM development. Network Application Technology &NCR to integrate network management programs with NCR StarSentry SNMP management platform. UB Networks has 50.4% stake in Networth. Networth licensed Grand Junction's router tech. 0OBase-T and Fast Ethernet adapter technologies. SynOptics and Stratacom in ATM technology. SynOptics and Xylogics integrated X's servers into S's hubs. Wellfleet and Make Systems announced a technology sharing agreement aimed at producing a network design tool for router-based networks. Crosscom and Multimedia Communications Inc. siged a technology licensing agreement. Network General acquired interests in Netsys network sstems. Source: Lexis/Nexis, 1996/7. 66 Appendix F. Interoperability Forums and Standards-setting Alliances, 1989-1996 Table F-1. Interonerabilitv Forums and Standards-settinp Alliances Name of Alliance and Date of Formation* 1. FDDI Forum 1989 Objective of Alliance Established by Synernetics in 1989 to accelerate the Fiber Distributed Data Interface (FDDI) Station Management (STM) standard to completion. 13 vendors also jointly developed a design specification for an interoperable STM implementation that ensures full FDDI standard compatibility. 2. 10OBaseT Consortium February 1990 3. Frame Relay Trial January 1993 4. Fast Ethernet Alliance August 1993 5. 100 VG-AnyLAN September 1993 6. 20Mbps Full duplex Ethernet October 1993 7. ATM25 Alliance September 1994 8. Token Ring Alliance (Astral) November 1994 9. Versit: Convergence of Communications and Computing November 1994 10. ISDN Forum January 1996 10 vendors formed a consortium to ensure interoperability of 10BaseT products and to exchange technical information. 13 companies participated in frame relay trial. The objective is to demonstrate the interoperability of frame relay technology in the Open System Interconnection (OSI) environment. Frame relay is an emerging technology which provides interconnection, both directly and indirectly, among subnetworks in OSI environment. About 80 vendors came together to form the Fast Ethernet Alliance (FEA). The goal of the FEA was to speed Fast Ethernet through the Institute of Electrical and Electronic Engineers (IEEE) 802.3 body, the committee that controls the standards for Ethernet. The FEA succeeded in June 1995, and the technology passed a full review and was formally assigned the name 802.3u. The IEEE's name for Fast Ethernet is OOBaseT. 100BaseTis an extension of the 10BaseT standard, designed to raise the data transmission capacity of 10OBaseT from 10Mbps to 100Mbps. 100 VG-AnyLAN is a new IEEE 802.12 technology for transmitting Ethernet (802.3) and token-ring (802.5) frame information at 100M bits per second. The actual standard was jointly developed by IBM Corp, AT&T Corp and Hewlett Packard Co. A group of 13 computer networking companies have agreed on the way forward for high- speed data networking and announced products based on a new technology standard known as 100 VG-AnyLAN. This coalition is competing with the FEA in designing a standard that allows existing networks to be upgraded to move data at a rate of 100Mbit/s About 12 firms formed a consortium to develop interoperable products incorporating the Full Duplex Switched Ethernet access method. Full-duplex Ethernet boosts speeds by allowing data to be transferred in both directions at once on a dedicated Ethernet segment, something that's usually prevented by CSMA/CD. 25 vendors formed the ATM25 Alliance to accelerate the acceptance of Asynchronous Transfer Mode (ATM) at the desktop. The group's charter is to make 25Mbps ATM products open, accessible and interoperable with other leading ATM products. 16 vendors of Token-Ring networking products formed an alliance to promote their ties with customers, assuring them that new products are designed to be interoperable. Apple Computer, AT&T, IBM and Siemens formed Versit, a global initiative to enable interoperability between existing and emerging communication and information products. The cooperation covers products including telephones, PBXs, computers, networks, servers and personal digital assistants. Four companies formed the ISDN Forum to simplify interoperability between ISDN customer premise equipment (CPE) and the public switched network. 3Com, Ascend Communications, AT&T Network Systems, and U.S. Robotics are the forum's founders. 67 Table F-1. Interoperability Forums and Standards-setting Alliances, Continued Name of Alliance and Date of Formation* 11. ATM RMON February 1996 12. Wireless LAN April 1996 Objective of Alliance Seven firms collaborate to develop specification for ATM remote monitoring and analysis tool solutions to advance the management of ATM networks. 13 vendors of wireless LAN formed alliance to promote awareness of wireless LAN. It does not plan to get involved in standards making or interoperability; instead it creates an advisory committee for the industry, composed of customers, independent software vendors and systems integrators. More than 50 firms have joined the Gigabit Ethernet Alliance to develop 13. Gigabit Ethernet Gigabit Ethernet Standard that allows half and full duplex operations at 1,000 Alliance May 1996 megabits per second. In addition, it also addresses backward compatibility with 10BaseT and 100BaseT technologies. The Gigabit task force will actively pursue specification development of protocol, media access controller, repeater and physical layer technologies. 13 ISDN customer premise equipment (CPE) manufacturers have formed a new 14. Vendor's ISDN Association organization -- called Vendors' ISDN Association (VIA), previously was known as the ISDN Forum. The group has unified CPE vendors on key market and June 1996 technical issues that will help the entire ISDN industry grow. *Date of formation is approximate only. Source: Lexis/Nexis: CMPCOM database, 1996. 68 References Abernathy, W., & Clark, K., (1985), "Innovation: Mapping the winds of creative destruction," Research Policy, 14(1), 3-22. Abernathy, W., & Utterback, J., (1978), "Patterns of industrial innovation," Technology Review, 41-47. Abrahamson, E., & Rosenkopf, L., (1997), "Social network effects on the extent of innovation diffusion: A computer simulation," OrganizationScience, 8(3), 289-309. Aldrich, H., & Whetten D. A., (1981), "Organization-sets, action-sets, and networks: making the most of simplicity." In P. C. Nystrom & W. H. Starbuck, Handbook of OrganizationDesign. New York, Oxford University Press. 1: 385-408. Allen, T., J., (1977), Managing the Flow of Technology. Cambridge: Mass: MIT Press. Arora, A. & Gambardella A., (1995), "The division of innovative labor in biotechnology. Sources of Medical Technology: Universities and Industry." In N. Rosenberg, A. C. Gelijns & H. Dawkins. Washington, D.C., National Academy Press: 188-205. Axelrod, R., Mitchell, W., Thomas, R. E., Bennett, S. D., & Bruderer, E., (1995), "Coalition formation in standard-setting alliances," Management Science, 41(9), 14931508. Barley, S. R., Freeman, J., & Hybels, R., (1992), "Strategic alliances in commercial biotechnology." In N. Nohria & R. Eccles (Eds.), Networks and Organizations (311-347). Boston, MA: Harvard Business School Press. Barney, J. B., (1991), "Firm resources and sustained competitive advantage," Journal of Management, 17, 99-120. Baum, J., & Singh, J., (1994), "Organization-environment coevolution." In J. Baum & J. Singh (Eds.), Evolutionary Dynamics of Organizations. New York: Oxford University Press. Baum, J., & Oliver, C., (1991), "Institutional linkages and organizational mortality," Administratively Science Quarterly, 36, 187-218. Bavelas, A., (1948), "A mathematical model for group structures," Human Organization, 7, 16-30. 69 Bavelas, A., & Barrett, D., (1951), "An experimental approach to organizational communication," Personnel,27, 366-371. Bradach, J. L., & Eccles, R. G., (1989), "Price, authority, and trust: From ideal types to plural forms," Annual Review of Sociology, 15, 97-118. Burt, R., (1980), "Innovation as a structural interest: Rethinking the impact of network position on innovation adoption," Social Networks, 2, 327-355. Burt, R., (1992a), "The social structure of competition." In N. Nohria & R. Eccles (Eds.), Networks and Organizations(57-91). Boston, MA: Harvard Business School Press. Burt, R., (1992b), Structural Holes: The Social Structure of Competition. Cambridge, MA: Harvard University Press. Christensen, C., (1992a), "Exploring the limits of the technology S-curve. Part I: Component technologies," Productionand OperationsManagement, 1(4), 334-357. Christensen, C., (1992b), "Exploring the limits of the technology S-curve. Part II: Architectural technologies," Productionand OperationsManagement, 1(4), 358-366. Christensen, C., & Rosenbloom, R., (1995), "Explaining the attacker's advantage: Technological paradigms, organizational dynamics, and the value network," Research Policy, 24, 233-257. Clarysse, B., Debackere, K., & Dierdonck, R. V., (1996), "Research networks and organizational mobility in an emerging technological field: The case of plant biotechnology," Economics of Innovation and New Technology, 4, 77-96 Coleman, J. (1990), Foundations of Social Theory, (Chapter 12, 300-321). Cambridge, MA: Harvard University Press. Coleman, J., Katz, E., & Menzel, H., (1957), "The diffusion of an innovation among physicians," Sociometry, 20, 253-270. Contractor, F. J., & Lorange, P., (1988), "Why should firms cooperate? The strategy and economics basis for cooperative venture." In F. J. Contractor & P. Lorange (Eds.), Cooperative Strategies in International Business (3-30). Lexington, MA: Lexington Books. Coxon, A. P. M., (1982), The User's Guide to Multidimensional Scaling. Great Britain: Heinemann Educational Books. 70 Czepiel, J. A., (1975), "Patterns of interorganizational communications and the diffusion of a major technological innovation in a competitive industrial community," Academy of Management Journal, 18(1), 6-24. DeBresson, C., & Amesse, F., (1991), "Networks of innovators: A review and introduction to the issue," Research Policy, 20, 363-379. Dimaggio, P., (1986), "Structural analysis of organizational fields: A blockmodel approach," Research in OrganizationalBehavior, 8, 335-370. DiMaggio, P., (1994), "Commentary: The challenge of community evolution." In J. Baum & J. Singh (Eds.), EvolutionaryDynamics of Organizations(444-450). New York: Oxford University Press. Fombrun, C. J., (1982), "Strategies for network research in organizations," Academy of Management Review, 7(2), 280-291. Freeman, C., (1991), "Networks of innovators: A synthesis of research issues," Research Policy, 20, 499-514. Freeman, C., (1994), "Critical survey," CambridgeJournalof Economics, 18, 463-514. Freeman, L. C., (1978), "Centrality in social networks: Conceptual clarification," Social Networks, 1, 215-239. Garud, R., & Kumaraswamy, A., (1993), "Changing competitive dynamics in network industries: An exploration of Sun Microsystems' open systems strategy," Strategic Management Journal, 14, 351-369. Garrette, B., & Dussauge, P., (1995), "Patterns of strategic alliances between rival firms," Group Decision and Negotiation, 4, 429-452. Granovetter, M., (1992), "Problems of explanation in economic sociology." In N. Nohria & R. Eccles (Eds.), Networks and Organizations: Structure, Form and Action (25-56). Boston, MA: Harvard Business School Press. Gray, B., (1990), "Building interorganizational alliances: Planned change in a global environment," Research in OrganizationalChange and Development, 4, 101-140. Gulati, R., (1995), "Social structure and alliance formation patterns: A longitudinal analysis," Administrative Science Quarterly, 40, 619-652. 71 Hagedoorn, J., (1993), "Understanding the rationale of strategic technology partnering: Interorganizational modes of cooperation and sectoral differences," Strategic Management Journal, 14, 371-385. Hagedoorn, J., (1995), "Strategic technology partnering during the 1980s: Trends, networks and corporate patterns in non-core technologies," Research Policy, 24, 207-231. Hakansson, H., & Johanson, J., (1988), "Formal and informal cooperation strategies in international industrial networks." In F. J. Contractor & P. Lorange (Eds.), Cooperative Strategies in InternationalBusiness (369-379). Lexington, MA: Lexington Books. Hamel, G., (1991), "Competition for competence and inter-partner learning within international strategic alliances," Strategic ManagementJournal, 12, 83-103. Harrigan, K. R., (1987), "Strategic alliances: Their new role in global competition," Columbia Journal of World Business, Summer, 67-69. Henderson, R., & Clark, K. B., (1990), "Architectural innovation: The reconfiguration of existing product technologies and the failure of established firms," Administrative Science Quarterly, 35, 9-30. Hergert, M., & Morris, D., (1988), "Trends in international collaborative agreements." In F. Contractor & P. Lorange (Eds.), CooperativeStrategies in InternationalBusiness (99109). Lexington, MA: Lexington Books. Hughes, T. P., (1987), "The evolution of large technological systems." In W. E. Bijker, T. P. Hughes, & T. Pinch (Eds.), The Social Construction of Technological Systems (51-82). Cambridge, MA: MIT Press. Jones, C., Hesterly, W. S., & Borgatti, S. P., (1997), "A general theory of network governance: Exchange conditions and social mechanisms," Academy of Management Review, 22(4), 911-945. Kogut, B., & Zander, U., (1992), "Knowledge of the firm, combinative capabilities, and the replication of technology," OrganizationScience, 3(3), 383-397. Liebeskind, J. P., Oliver, A. L., Zucker, L., & Brewer, M., (1996), "Social networks, learning and flexibility: Sourcing scientific knowledge in new biotechnology firms," OrganizationScience, 7(4), 428-443. Mariti, P., & Smiley, R. H., (1983), "Cooperative agreements and the organizational of industry," The Journalof IndustrialEconomics, 31(4), 437-451. 72 Marsden, P. V., (1990), "Network data and measurement," Annual Review of Sociology, 16, 435-463. Miller, R., Hobday, M., Leroux-Demers, T., & Olleros, X., (1995), "Innovation in complex systems industries: The case of flight simulaton," Industrial and Corporate Change, 4(2), 363-400. Mitchell, W., & Singh, K., (1992), "Incumbents' use of pre-entry alliances before expansion into new technical subfields of an industry," Journal of Economic Behavior and Organization, 18, 347-372. Mizruchi, M., & Galaskiewicz, J., (1993), "Networks of interorganizational relations," SociologicalMethods and Research, 22(1), 46-70. Morgan, D. L., Neal, M. B., & Carder, P., (1996), "The stability of core and peripheral networks over time," Social Networks, 19, 9-25. Nohria, N., & Eccles, R., (1992), Networks and Organizations: Structure, Form and Action. Boston, MA: Harvard University Press. Nohria, N. & Garcia-Pont C., (1991), "Global strategic linkages and industry structure," Strategic Management Journal, 12: 105-124. Olleros, F.J., & Macdonald, R. J., (1988), "Strategic alliances: Managing complementarity to capitalize on emerging technologies," Technovation, 7, 155-176. Ouchi, W. G., (1980), "Markets, bureaucracies, and clans," Administrative Science Quarterly, 25, 129-142. Powell, W., Koput, K., & Laurel, S., (1996), "Interorganizational collaboration and the locus of innovation: Networks of learning in biotechnology," Administrative Science Quarterly, 41(1), 116-14 Richardson, G. B., (1972), "The organization of industry," Economic Journal, 82, 883896. Ring, P. S., & Van de Ven, A. H., (1992), "Structuring cooperative relationships between organizations," Strategic Management Journal, 13, 483-498. Roberts, E. B., & Berry, C. A., (1985), "Entering new businesses: Selecting strategies for success," Sloan Management Review, 3-19. 73 Rosenbloom, R. S., & Cusumano, M. A., (1987), "Technological pioneering and competitive advantage: The birth of the VCR industry," California Management Review, 29(4), 51-76. Rosenkopf, L., & Tushman, M., (1994), "The coevolution of technology and organization." In J. Baum & J. Singh (Eds.), Evolutionary Dynamics of Organizations (403-424). New York: Oxford University Press. Schiffman, S., Reynolds, M., & Young, F., (1981), Introduction to Multidimensional ScaliTheory, Methods, and Applications. New York: Academic Press. Schumpeter, J. A. (1942). Capitalism, Socialism and Democracy. New York, Harper & Brothers. Sinha, D. K., & Cusumano, M., (1991), "Complementary resources and cooperative research: A model of research joint ventures among competitors," Management Science, 37(9), 1091-1106. Stork, D., (1991), "A longitudinal study of communication networks: Emergence and evolution in a new research organization," Journal of Engineering and Technology Management, 7, 177-196. Teece, D., (1986), "Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy," Research Policy, 15, 285-305. Teece, D., (1992), "Strategies for capturing the financial benefits from technological innovation." In N. Rosenberg, R. Landau, & D. Mowery (Eds.), Technology and the Wealth of Nations (175-205). Stanford, California: Stanford University Press. Thorelli, H. B., (1986), "Networks: between markets and hierarchies," Strategic Management Journal,7, 37-51. Tichy, N. M., Tushman, M. L., & Fombrun, C., (1979), "Social network analysis for organizations," Academy of Management Review, 4(4), 507-519. Tucci, C., & Cusumano, M.,(1994), Benefits and pitfalls of international strategic technology alliances (Working Paper No. 110-94): International Center for Research on the Management of Technology, Massachusetts Institute of Technology. Tushman, M., & Anderson, P., (1986), "Technological discontinuities and organizational environment," Administrative Science Quarterly, 31, 439-456. 74 Tushman, M. L., & Rosenkopf, L., (1992), "Organizational determinants of technological change: Toward a sociology of technological evolution," Research in Organizational Behavior, 14, 311-347. Utterback, J., & Suarez, F., (1993), "Innovation, competition, and industry structure," Research Policy, 22, 1-21. Van de Ven, A., & Garud, R., (1994), "The coevolution of technical and institutional events in the development of an innovation." In J. Baum & J. Singh (Eds.), Evolutionary Dynamics of Organizations.New York: Oxford University Press. Walker, G., Kogut, B., & Shan, W., (1997), "Social capital, structural holes and the formation of an industry network," OrganizationScience, 8(2), 109-125. Wasserman, S., & Faust, K., (1994), Social Network Analysis: Methods and Applications. New York: Cambridge University Press. Wernerfelt, B., (1984), "A resource-based view of the firm," Strategic Management Journal, 5, 171-180. Williamson, O. E., (1985), The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting.New York: Free Press. Yan, A., & Gray, B., (1994), "Bargaining power, management control, and performance in United States-China joint ventures: A comparative case study," Academy of Management Journal, 37(6), 1478-1517. 75